Chapter 17 Security - New
Chapter 17 Security - New
The sender has a key which is used to encrypt some plaintext and the
ciphertext produced is transmitted
to the receiver. If symmetric key encryption is used, there needs to be a
secure method for the sender and receiver to be provided with the
secret key.
Security concerns
When using asymmetric key encryption, the process starts with the receiver. The
receiver must be in possession of two keys. A public key which is not secret and a
private key which is secret and known only to the receiver. The receiver can send
the public key to a sender, who uses the public key for encryption and sends the
ciphertext to the receiver. The receiver is the only person who can decrypt the
message because the private and public keys are a matched pair. The public key
can be provided to any number of different people allowing the receiver to receive a
private message from any of them.
This way of creating a digital signature has a disadvantage of encrypting the whole
message as a way of authenticating a message which in the end slows down the
process of data transmission.
One way Hash function - Sending
The same public hash key function is used that was used by the sender so the same
digest is produced if the message has been transmitted without alteration. The
decryption of the digital signature produces an identical digest if the message was
genuinely sent by the original owner of the public key that the receiver has used.
This approach has allowed the receiver to be confident that the message is both
authentic and unaltered.
SSL is a client-server application. The interface between an application and TCP uses a port number.
In the absence of a security protocol, TCP services an application using the port number. The
combination of an IP address and a port number is called a 'socket'. When the Secure Socket Layer
protocol is implemented it functions as an additional layer between TCP in the transport layer and the
application layer. When the SSL protocol is in place, the application protocol HTTP becomes HTTPS.
Systems inherently lack optimum security. Operating systems are notorious for
lacking good security. There is a tendency for operating systems to increase in
complexity which tends to offer the potential for more insecurity. The regular updates
are often required because of a newly discovered security vulnerability.