TD 92579EN
15 February 2012 / Ver. H
Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 5.0.x)
23
Cryptography tasks can be divided into the two general categories Encryption and
Authentication.
Encryption
Encryption
is the scrambling of information so that the original message cannot be
determined by unauthorized recipients by applying an
encryption algoritm
to the message
plaintext
producing
ciphertext
(appearently random bits). A
decryption algoritm
, if given
the correct key, converts the ciphertext back into plaintext. Public key algoritms use paired
keys, one for encryption and another for decryption.
Authentication
Authentication is the verification of a message’s sender. This requires the message to be
protected so it cannot be altered, usually by generating a
digital signature
formed by a
hash of the message. Only the correct key can generate a valid signature.