Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
2.3 PUBLIC-KEY ENCRYPTIONOf equal importance to symmetric encryption is public-key encryption, which findsuse in message authentication and key distribution.Public-Key Encryption StructurePublic-key encryption, first publicly proposed by Diffie and Hellman in 1976[DIFF76], is the first truly revolutionary advance in encryption in literally thousandsof years. Public-key algorithms are based on mathematical functions rather than onsimple operations on bit patterns, such as are used in symmetric encryption algorithms.More important, public-key cryptography is asymmetric, involving the useof two separate keys, in contrast to symmetric encryption, which uses only one key.The use of two keys has profound consequences in the areas of confidentiality, keydistribution, and authentication.Before proceeding, we should first mention several common misconceptionsconcerning public-key encryption. One is that public-key encryption is more securefrom cryptanalysis than symmetric encryption. In fact, the security of any encryptionscheme depends on (1) the length of the key and (2) the computational work involvedin breaking a cipher. There is nothing in principle about either symmetric or public-keyencryption that makes one superior to another from the point of view of resisting cryptanalysis.A second misconception is that public-key encryption is a general- purposetechnique that has made symmetric encryption obsolete. On the contrary, because ofthe computational overhead of current public-key encryption schemes, there seems noforeseeable likelihood that symmetric encryption will be abandoned. Finally, there isa feeling that key distribution is trivial when using public-key encryption, compared tothe rather cumbersome handshaking involved with key distribution centers for symmetricencryption. For public-key key distribution, some form of protocol is needed,often involving a central agent, and the procedures involved are no simpler or anymore efficient than those required for symmetric encryption.A public-key encryption scheme has six ingredients ( Figure 2.7a ):• Plaintext: This is the readable message or data that is fed into the algorithm asinput.• Encryption algorithm: The encryption algorithm performs various transformationson the plaintext.• Public and private key: This is a pair of keys that have been selected so thatif one is used for encryption, the other is used for decryption. The exact
Sedang diterjemahkan, harap tunggu..
