12.2 Cryptography Is Key Management

It should be evident from the earlier sections that although cryptography can be classified according to whether it will be used to provide confidentiality, integrity and authentication, each of these approaches relies on the protection of secret keys to work properly.

For symmetrical encryption and keyed hash codes, Alice and Bob must agree on a key before sending any messages and ensure that the key does not fall into Eve's hands. For asymmetric encryption and digital signatures, only one person has to keep the secret (the private key), which is an improvement over needing an agreed key, but still requires either Alice or Bob to remain vigilant.

Alice and Bob have no way of determining if Eve has been able to learn the secrets that they are protecting. When Eve intercepts a message, she is careful to send on a copy (or a replacement message) to Bob. If Eve has learned the keys, then she is able to impersonate Alice or Bob and interfere with their messages at will.

To minimize the damage Eve can cause if she discovers the secret keys, Alice and Bob may agree to change their keys regularly. Eve may be able to obtain or guess the key, but if Alice and Bob change the keys every week, Eve will only be able to meddle with up to seven days worth of messages before she is back in the dark. Selecting and changing keys is an important process, and the problems of storing and distributing keys securely are two of the most difficult aspects of implementing cryptographic solutions. We will discuss the issues that arise in the following chapters.



Programming. NET Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net