![]() |
|||||
|
The foundation technology for Public Key Infrastructures (PKI) is asymmetric cryptography, so called because it uses different keys for the encryption and decryption processes. A pair of keys, one intended for private use and one intended for public use, is generated for each user. The public key is derived from the private key, yet it is computationally infeasible to derive the private key from a public key. Because of this, public keys can be made widely available without compromising the integrity of the system. When information is encrypted with a public key, it can be decrypted only with its corresponding private key. Therefore, when the sender of a message uses the public key of the recipient to encrypt it, the sender can be sure that its contents can only be read after being decrypted by the recipient (the owner of the private key) and by no one else. Conversely, when information is encrypted with a private key, it can be decrypted only with the corresponding public key. Therefore, the recipient of information successfully decrypted with a public key can be certain that only the private key could have encrypted it. This is the basis for a digital signature. A digital signature provides evidence on who originated the data and whether the data has been altered in any way. A Certification Authority (CA) digitally signs and issues public key certificates. The CA's digital signature cryptographically binds the user's identity with the user's public key. The CA's digital signature can be validated to ensure that the public key certificate has been signed by a recognized and approved CA. Security services generally associated with public-key cryptography include: strong authentication--cryptographic verification of the identity of an individual, device, or other entity within a computer system. data confidentiality--assurance that the person receiving the information is the intended recipient and that the information has not been disclosed to unauthorized entities. data integrity--verification that no unauthorized modification of the data has occurred. non-repudiation--assured undeniability of participation in a transaction. For more information, please contact Steve Boczenowski using the employee directory. |
Solutions That Make a Difference.® |
|
|