Академический Документы
Профессиональный Документы
Культура Документы
Advanced Communication
Systems M. Tech, 3rd Semester
Contents
Introduction Why Digital Envelop Formation of Digital Envelop Reading Digital Envelop Common Algorithms used Advantages Applications Conclusion Refernces
Encryption
Decryption
K e y # 1
K e y # 1
Same key to encrypt and decrypt message Sender sends message and key to receiver Strength:
Simple and really very fast (order of 1000 to 10000 faster than asymmetric mechanisms) Super-fast (and somewhat more secure) if done in hardware (DES, Rijndael)
Weakness:
Must agree the key beforehand
Then anyone can send him messages that only he can read Strength :
High Security Need not pass key for decryption
Weakness
Very slow process
Encryption
Decryption
K e y # 1
K e y # 2
Digital Envelop
Digital Envelope
Plain Text message Receivers Public key
Symmetric Key
Encrypted Text
Cipher Text
Digital Envelope
Decryption
Symmetric Key
Compar e Yes
Discard
Secure Data
Hash algorithms
MD5 SHA with at least 128 bits,256 bits better
Advantages
Increased performance without sacrificing security Multi addressed communications email
Single copy of encrypted message Different public keys for each user
Applications
Key exchange protocols PGP open source for email security Oracle S-MIME (Multipurpose Internet Mail Extension) SSL (Secure Socket Layer)
Conclusion
References
Ramachandran Ganesan1, Mohan Gobi1and Kanniappan Vivekanandan Novel Digital Envelope Approach for A Secure E-Commerce Channel International Journal of Network Security, Vol.11, No.3, PP.121{127, Nov. 2010 Wenping Guo, Ying Chen, and Xiaoming Zhao A Study on High-Strength Communication Scheme Based on Signed Digital Envelope Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10) Jinggangshan, P. R. China, 2-4, April. 2010, pp. 190-192 Jinggangshan, P. R. China, 2-4, April. 2010, pp. 190192 W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd Edition, Pearson Education, 2002.
15
16