1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 Figure 5-87: Encryption Algorithm and Key

1 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 246
Download on canonical page 246 pages, 2.94 Mb
Data confidentiality can be maintained by keeping the algorithm, the key, or both, secret from unauthorized
people. In most cases, including OpenSSL, the algorithm used is well-known, but the key is protected from
unauthorized people.
5.12.1.1.1.1 Encryption with symmetric keys
A symmetric key, also known as a secret key, is a single key that is used for both encryption and decryption.
For example, key = 2 used in the above illustration is a symmetric key. Only the parties exchanging secret
messages have access to this symmetric key.
5.12.1.1.1.2 Encryption with asymmetric keys
Asymmetric key encryption and decryption, also known as public key cryptography, involve the use of a key
pair. Encryption performed with one of the keys of the key pair can only be decrypted with the other key of
the key pair. The two keys of the key pair are known as public key and private key. A user generates public
and private keys from a key pair. The user then makes the public key available to others while keeping the
private key a secret.
Figure 5-88 conceptually illustrates the creation of asymmetric keys for encryption and decryption.
183
Figure 5-87: Encryption Algorithm and Key
MENU

Models

Contents