Preview

Asymmetric Encryption

Powerful Essays
Open Document
Open Document
6805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Asymmetric Encryption
V O L U M E

2 ,

N U M B E R

1 — S P R I N G

1 9 9 6

CryptoBytes
R S A L A B O R A T O R I E S ’

Contents
1 Asymmetric E c y t o :E o u i n nrpin vlto and Enhancements 2 Eio' Nt dtrs oe 7 PayWo and rd Mc Mn: i ro i t Two Simple Mc i ropayment Schemes 12 Message Authentication Using Hash Functions: the HMAC Construction 16 Announcements

The technical newsletter of RSA Laboratories, a division of RSA Data Security, Inc.

A sy m m e tri c E n c ry p ti o n : Ev o lu ti o n a n d En h a n c e m e n ts
Don B. Johnson and Stephen M. Matyas
IBM Cryptography Center of Competence, MS P330 522 South Road Poughkeepsie, NY 12601 USA

When public key cryptography was invented, one o i su e w si e t f e a t es c r t a s o to f t ss a dniid s h eue rnpr f secret symmetric keys. The objectives of such a key transport mechanism keep evolving as attacks are identified, hidden assumptions are revealed, proofs of security are given, and additional capability is nee.Tepoescniusi ti atce edd h rcs otne n hs ril. W e trace the evolution of some asymmetric key transport mechanisms, starting with the method in PKCS #1 [10]. We t e d s u s i h s o i a o d r, hn ics, n itrcl re two masking techniques developed by IBM cryptographers, and the method currently under study in ANSI draft standard X9.44 RSA Key Tr n p r . asot W e then give ideas that may be useful when using elliptic curve cryptography, where t e s z o t e h ie f h block is typically much less than that used with other algorithms, for example, RSA. W e w l u e t e f l o i g t rminology: il s h olwn e Formatted block — a b o k o d t p s e a i p t lc f aa asd s nu t temtos I cnan asc o h e h d . t o t i s e ret symmetric key
Don Johnson, a senior programmer at IBM, is an architect of I M s c y t s l t o s a d t e c m a y s re re e t t v t A S B ’ r p o o u i n n h o p n ’ p snaie o NI X9.F.1 and X9.F.3, IEEE P1363, and the X/Open Crypto API workgroups. He can be contacted at dbj@VNET. . O M. IBM C Mike

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    S T E FA N I E M A R I A B AC K E S…

    • 1218 Words
    • 18 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Rogaway, P. (2011). Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC). Retrieved February 21, 2015, from http://web.cs.ucdavis.edu/~rogaway/papers/modes.pdf…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Almost there last revision

    • 2279 Words
    • 8 Pages

    C o u n se lor : Wa s it th e c a nc e r th a t…

    • 2279 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Tilborg, H. (2002). Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    Cryptanalysis is the study of defeating the methods generated by cryptography. The aim is to find out some flaws in a cryptographic scheme. Cryptology is the combined study of both cryptography and cryptanalysis.…

    • 1790 Words
    • 8 Pages
    Powerful Essays

Related Topics