Hervey Allen Phil Regnauld
26 February 2009 Manila, Philippines
http://nsrc.org/tutorials/2009/apricot/dnssec/
DNSSEC Tutorial: Public / Private Key Refresher Hervey Allen Phil - - PowerPoint PPT Presentation
DNSSEC Tutorial: Public / Private Key Refresher Hervey Allen Phil Regnauld 26 February 2009 Manila, Philippines http://nsrc.org/tutorials/2009/apricot/dnssec/ Public-Private Keys Refresher Ciphers Ciphertext Symmetric Cipher /
http://nsrc.org/tutorials/2009/apricot/dnssec/
Ciphers Ciphertext Symmetric Cipher / Private Key Public Key Hashing functions Hash / message digest Digital Signatures
We start with plaintext. Something you can read. We apply a mathematical algorithm to the
The algorithm is the cipher. The plaintext is turned in to ciphertext. Almost all ciphers were secret until recently. Creating a secure cipher is HARD.
To create ciphertext and turn it back to plaintext
The security of the ciphertext rests with the key.
This type of key is called a private key. This type of cipher system is efficient for large
This is a symmetric cipher.
We generate a cipher key pair. One key is the
The private key remains secret and should be
The public key is freely distributable. It is related
Use the public key to encrypt data. Only someone
Symmetric ciphers (one private key) are
Attack on the public key is possible via chosen-
For larger data transmissions than used in
A mathematical function that generates a fixed
You cannot generate the original data from the
Hopefully you cannot find two sets of data that
− md5: Outputs 128 bit result. Fast. Collisions found. − sha-1: Outputs 160 bits. Slower. Collisions in 2x69. − sha-2: Outputs 224-512 bits. Slower. Collisions
− sha-3: TBA: Currently in development via a new NIST
*Image courtesy Wikipedia.org.
*Such as SHA-1,SHA-2 etc.
− Type in a passphrase/password. − Run the hashing function on the text. − If the message digest matches, you typed in the
− Munge a document. − Encrypt the message digest with your private key. − Send the document plus the encrypted message digest. − On the other end munge the document and decrypt the
− If they match, the document is authenticated.
rsa can do 2048 bits and greater dsa max bits is 1024 md5 has collisions sha-1 / sha-2 collisions expected, but more
Public / Private keys Message digests Digital signatures