
Encryption and Decryption
Appendix J
Introduction to Public-Key Cryptography
771
Public-Key Encryption
The most commonly used implementations of public-key encryption are based on
algorithms patented by RSA Data Security. Therefore, this section describes the RSA
approach to public-key encryption.
Public-key encryption (also called asymmetric encryption) involves a pair of keys—a
public key and a private key—associated with an entity that needs to authenticate its
identity electronically or to sign or encrypt data. Each public key is published, and the
corresponding private key is kept secret. (For more information about the way public keys
are published, see “Certificates and Authentication,” which begins on page 774.
”
) Data
encrypted with your public key can be decrypted only with your private key. Figure J-2
shows a simplified view of the way public-key encryption works.
Figure J-2
Public-Key Encryption
The scheme shown in Figure J-2 lets you freely distribute a public key, and only you will be
able to read data encrypted using this key. In general, to send encrypted data to someone,
you encrypt the data with that person’s public key, and the person receiving the encrypted
data decrypts it with the corresponding private key.
Compared with symmetric-key encryption, public-key encryption requires more
computation and is therefore not always appropriate for large amounts of data. However,
it’s possible to use public-key encryption to send a symmetric key, which can then be used
to encrypt additional data. This is the approach used by the SSL protocol.
As it happens, the reverse of the scheme shown in Figure J-2 also works: data encrypted
with your private key can be decrypted only with your public key. This would not be a
desirable way to encrypt sensitive data, however, because it means that anyone with your
public key, which is by definition published, could decrypt the data. Nevertheless,
private-key encryption is useful, because it means you can use your private key to sign data
with your digital signature—an important requirement for electronic commerce and other
commercial applications of cryptography. Client software such as Communicator can then
use your public key to confirm that the message was signed with your private key and that it
hasn’t been tampered with since being signed. “Digital Signatures” (beginning on page 772)
and subsequent sections describe how this confirmation process works.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...