Page 118 - CISSO_Prep_ Guide
P. 118

is known as the key agreement protocol. This is used in some
            internet applications and in IPSEC.

            Several rules can be used to remember how asymmetric
            algorithms work. Remembering these rules can make the
            understanding of asymmetric algorithms a lot easier.

            The first rule is essential - that is:
            The keys in an asymmetric algorithm only work as a pair. When
            one key (one half of the key pair) is used to encrypt a message,
            the other half of the key pair is the ONLY key that will
            successfully decrypt the message.



            Confidentiality

            The use of other asymmetric algorithms has been to distribute
            the secret symmetric key between two parties that wish to
            communicate. This is in contrast to Diffie-Hellman that was
            used to negotiate the secret symmetric key.

             This can be done as follows:
   113   114   115   116   117   118   119   120   121   122   123