Public Key Authentication

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
'''Public key authentication''' is a process of information cryptography that involves the use of public and private keys.
'''Public key authentication''' is a process of information cryptography that involves the use of public and private keys.
 +
*also known as asymmetric authentication
 +
*cryptography
 +
*key pair (public key/private key)
 +
*private key only exists on source system and generates signatures which cannot be forged
 +
**anyone possessing matching public key can verify the signature
 +
*public key can be used to encrypt messages for the source system
 +
**only the system possessing the matching private key can decrypt the message
==Background==
==Background==
-
===Process===
+
*briefly explain password-based/symmetric key authentication
 +
*go in more detail on public key authentication
 +
 
 +
===Identity Verification Process===
* Generate a key pair on your computer
* Generate a key pair on your computer
-
* Copy and/or send your public key to the server or desired recipient of the messages
+
* Copy your public key to the server
* When authentication is required, a signature is generated using the private key
* When authentication is required, a signature is generated using the private key
* Server uses the public key to verify the signature and grant access
* Server uses the public key to verify the signature and grant access
 +
 +
===Message Encryption/Decryption Process===
 +
* Generate a key pair on your computer
 +
* Send your public key to the desired user you wish to communicate with
 +
** Recipient may generate their own key pair
 +
* Sender uses the recipient's public key to encrypt the message and sends it
 +
* Recipient uses their private key to decrypt the message
==Benefits==
==Benefits==
 +
* if server is hacked/spoofed
 +
** attacker can learn your password in symmetric key authentication
 +
** attacker would still need your private key in asymmetric key
==Drawbacks==
==Drawbacks==
 +
* computational cost
 +
** explain uses of hybrids
==Public Key Algorithms==
==Public Key Algorithms==
 +
* RSA Algorithm
 +
* DSA/DSS (Digital Signature Standard) Algorithm
 +
* Diffie-Hellman Algorithm
==References==
==References==
*[http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.2.8] - Using Public Key Authentication
*[http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.2.8] - Using Public Key Authentication
*[http://www.infosecwriters.com/text_resources/pdf/Public_Key_Cryptography_AMS.pdf] - Public Key Cryptography
*[http://www.infosecwriters.com/text_resources/pdf/Public_Key_Cryptography_AMS.pdf] - Public Key Cryptography
 +
==See Also==
==See Also==

Revision as of 01:46, 5 April 2009

Public key authentication is a process of information cryptography that involves the use of public and private keys.

  • also known as asymmetric authentication
  • cryptography
  • key pair (public key/private key)
  • private key only exists on source system and generates signatures which cannot be forged
    • anyone possessing matching public key can verify the signature
  • public key can be used to encrypt messages for the source system
    • only the system possessing the matching private key can decrypt the message

Contents

Background

  • briefly explain password-based/symmetric key authentication
  • go in more detail on public key authentication

Identity Verification Process

  • Generate a key pair on your computer
  • Copy your public key to the server
  • When authentication is required, a signature is generated using the private key
  • Server uses the public key to verify the signature and grant access

Message Encryption/Decryption Process

  • Generate a key pair on your computer
  • Send your public key to the desired user you wish to communicate with
    • Recipient may generate their own key pair
  • Sender uses the recipient's public key to encrypt the message and sends it
  • Recipient uses their private key to decrypt the message

Benefits

  • if server is hacked/spoofed
    • attacker can learn your password in symmetric key authentication
    • attacker would still need your private key in asymmetric key

Drawbacks

  • computational cost
    • explain uses of hybrids

Public Key Algorithms

  • RSA Algorithm
  • DSA/DSS (Digital Signature Standard) Algorithm
  • Diffie-Hellman Algorithm

References

  • [1] - Using Public Key Authentication
  • [2] - Public Key Cryptography

See Also

External Links

--larocqt 9:23 PM, 4 April 2009 (EDT)

Personal tools