Page 554 - StudyBook.pdf
P. 554

538    Chapter 9 • Basis of Cryptography


                Understanding Asymmetric Key Sizes
           Damage & Defense…  and 2048 bits. The keys are this large because factoring, while still a dif-
                RSA, Diffie-Hellman, and other asymmetric algorithms use larger keys
                than their symmetric counterparts. Common key sizes include 1024 bits

                ficult operation, is much easier to perform than the exhaustive key search
                approach used with symmetric algorithms. The slowness of PKE systems is
                also due to the larger key sizes. Since most computers can only handle 32
                bits of precision, different “tricks” are required to emulate the 1024-bit
                and 2048-bit integers. However, the additional processing time is justi-
                fied, since, for security purposes, 2048-bit keys are considered secure
                “forever.”




             Hashing Algorithms


             Hashing is a technique in which an algorithm (also called a hash function) is applied
             to a portion of data to create a unique digital “fingerprint” that is a fixed-size vari-
             able. If anyone changes the data by so much as one binary digit, the hash function
             will produce a different output (called the hash value or a message digest) and the
             recipient will know that the data has been changed. Hashing can ensure integrity
             and provide authentication.The hash function cannot be “reverse-engineered”; that
             is, you can’t use the hash value to discover the original data that was hashed.Thus,
             hashing algorithms are referred to as one-way hashes.A good hash function will not
             return the same result from two different inputs (called a collision). In other words,
             the collision domain of the function should be large enough to make it extremely
             unlikely to have a collision.All of the encryption algorithms studied so far, both
             symmetric and asymmetric, are reversible, (i.e., they can be converted from clear-
             text to ciphertext and back again, provided the appropriate keys are used).
             However, there is no reversible function for hashing algorithms, so original material
             cannot be recovered. For this reason, hashing algorithms are commonly referred to
             as one-way hashing functions. However, irreversible encryption techniques are useful
             for determining data integrity and authentication.














          www.syngress.com
   549   550   551   552   553   554   555   556   557   558   559