Cryptography is a tool that can be used to keep information
confidential and to ensure its integrity and authenticity. All modern
cryptographic systems are based on Kerckhoff's principle of having a
publicly-known algorithm and a secret key. Many cryptographic algorithms use
complex transformations involving substitutions and permutations to transform
the plaintext into the ciphertext. However, if quantum cryptography can be made
practical, the use of one-time pads may provide truly unbreakable
cryptosystems.
Cryptographic algorithms can be divided into symmetric-key
algorithms and public-key algorithms. Symmetric-key algorithms mangle the bits
in a series of rounds parameterized by the key to turn the plaintext into the
ciphertext. Triple DES and Rijndael (AES) are the most popular symmetric-key
algorithms at present. These algorithms can be used in electronic code book
mode, cipher block chaining mode, stream cipher mode, counter mode, and others.
Public-key algorithms have the property that different keys
are used for encryption and decryption and that the decryption key cannot be
derived from the encryption key. These properties make it possible to publish
the public key. The main public-key algorithm is RSA, which derives its
strength from the fact that it is very difficult to factor large numbers.
Legal, commercial, and other documents need to be signed.
Accordingly, various schemes have been devised for digital signatures, using
both symmetric-key and public-key algorithms. Commonly, messages to be signed
are hashed using algorithms such as MD5 or SHA-1, and then the hashes are
signed rather than the original messages.
Public-key management can be done using certificates, which
are documents that bind a principal to a public key. Certificates are signed by
a trusted authority or by someone (recursively) approved by a trusted
authority. The root of the chain has to be obtained in advance, but browsers
generally have many root certificates built into them.
These cryptographic tools can be used to secure network
traffic. IPsec operates in the network layer, encrypting packet flows from host
to host. Firewalls can screen traffic going into or out of an organization,
often based on the protocol and port used. Virtual private networks can
simulate an old leased-line network to provide certain desirable security
properties. Finally, wireless networks need good security and 802.11's WEP does
not provide it, although 802.11i should improve matters considerably.
When two parties establish a session, they have to
authenticate each other and if need be, establish a shared session key. Various
authentication protocols exist, including some that use a trusted third party,
Diffie-Hellman, Kerberos, and public-key cryptography.
E-mail security can be achieved by a combination of the
techniques. PGP, for example, compresses messages, then encrypts them using
IDEA. It sends the IDEA key encrypted with the receiver's public key. In
addition, it also hashes the message and sends the signed hash to verify
message integrity.
Web security is also an important topic, starting with secure
naming. DNSsec provides a way to prevent DNS spoofing, as do self-certifying
names. Most e-commerce Web sites use SSL to establish secure, authenticated
sessions between the client and server. Various techniques are used to deal
with mobile code, especially sandboxing and code signing.
The Internet raises many issues in which technology interacts
strongly with public policy. Some of the areas include privacy, freedom of
speech, and copyright.
No comments:
Post a Comment
silahkan membaca dan berkomentar