Page 110 - E-Commerce
P. 110

109


              Key Management


              Having seen the various kinds of attacks possible on ad hoc wireless networks, we
              now look at various techniques employed to overcome the attacks. Cryptography is
              one of the most common and reliable means to ensure security. Cryptography is not

              specific to ad hoc wireless networks. It can be applied to any communication network.
              It is the study of the principles, techniques, and algorithms by which information is
              transformed into a disguised version which no unauthorized person can read, but which
              can be recovered in  its  original  form by an  intended  recipient.  In  the parlance of
              cryptography, the original information to be sent from one person to another is called
              plaintext. This plaintext is converted into ciphertext by the process of encryption, that
              is,  the  application  of  certain  algorithms  or  functions.  An  authentic  receiver  can
              decrypt/decode the ciphertext back into plaintext by the process of decryption. The

              processes of encryption and decryption are governed by keys, which are small amounts
              of information used by the cryptographic algorithms. When the key is to be kept secret
              to ensure the security of the system, it is called a secret key. The secure administration
              of cryptographic keys is called key management.


              Digital Certificate:


                    It is an electronic document used to prove ownership of a public key. The
                     certificate includes information about the key, information about its owner's
                     identity, and the digital signature of an entity that has verified the certificate's
                     contents are correct. If the signature is valid, and the person examining the
                     certificate  trusts  the  signer,  then  they  know  they  can  use  that  key  to
                     communicate with its owner.

                    The most common use of a digital certificate is to verify that a user sending a
                     message is who he or she claims to be, and to provide the receiver with the
                     means to encode a reply. An individual wishing to send an encrypted message
                     applies for a digital certificate from  a Certificate Authority  (CA). The CA
                     issues an encrypted digital certificate containing the applicant's public key and
                     a variety of other identification information. The CA makes its own public key
                     readily available through print publicity or perhaps on the Internet.

                    The recipient of an encrypted message uses the CA's public key to decode the
                     digital certificate attached to the message, verifies it as issued by the CA and
                     then obtains the sender's public key and identification information held within
                     the certificate. With this information, the recipient can send an encrypted reply.

                    The most widely used standard for digital certificates is X.509.
   105   106   107   108   109   110   111   112   113   114   115