Internet Security: A Jumpstart for Systems Administrators and IT Managers

3.3 RSA: public and private key

We now have a better idea about how the public-private system works. It is based on a technique patented by Diffie-Hellman in 1974 and formatted into architecture by Rivest, Shamir, and Adelman (RSA Data Security, Inc.). You can find more information at http://www.rsa.com/ and http://www.verisign.com/.

One example of the RSA implementation is PGP (Pretty Good Privacy). Philip Zimmermann originally created PGP. Zimmermann was the first person to make military-grade cryptography available to the general public. PGP can be used to send encrypted messages via most any e-mail system. All that is needed is software available from http://www.pgp.com/ and the public key of the party to whom you want to send an encrypted message.

There are several methods to encrypt messages. One standard is S/ MIME. There are also secret key systems and other systems to encrypt data as it travels from one location to another.

One process that can be used from a byproduct of public-private keys is "digital signatures." Digital signatures can be used to authenticate messages and prevent forgeries and/or tampering.

Following are encryption techniques that you will need to be familiar with:

At this point you may be thinking, "My head hurts! MD2, RC2, RFCs! 160-bit hash! I'll never use all these things!" So before we delve any further into this topic, let us take a break and address a few business concerns. We will take a side trip a three-hour tour, if you will.

Категории