Cybersecurity: from viruses to digital signature di Luca Libanore (luca@libanore.it), Francesco Pagano (fpagano64@alice.it)

- Asymmetric cryptography

An algorithm is based on an asymmetric cryptography [I1] [I2] [F1] [F2] [S1] [E1] [E2] [E3] [E4] if the key it uses to code is different from the key used to decode. It is asymmetric because the symmetry occurring on algorithm based on private key does not exist. It is asymmetric because there is a key that allows me to shift from the clear text to the coded one and another key (different from the previous) that allows me the opposite process, that is, from the coded to clear text.

Il processo di crittografia asimmetrico

This technique requires two keys to function, so each subject using this technology needs two keys: a private one (that is strictly confidential) and another one, called public key. This last key can be given to anybody.

Le coppie di chiavi del processo asimmetrico

So each subject has a strictly confidential key and another one that gives to all the people he wants to talk to.

La coppia di chiavi

Why do I need two keys and why can I give the public key to everybody? At a first sight it seems that this action can compromise the security of the subject. However it is not like that because the subject has a private key that allows him to make the following operations:

Come funzionano le chiavi

Let’s try to understand the functioning of the two keys. First of all remember that if I close the asymmetric lock with a key, I can only open my secret box with the other key and vice-versa. So, If I use the public key to close, I can only open it with the private one. To sum up, this strange lock which is not traditional allows me to create authentication functions and secret functions that we highlighted as basic elements.

Let’s see an example in the following picture. If Alice and Bob want to communicate by using the public key codification, they both need a two public and two private keys. Alice needs to create his pair of public/private keys and so does Bob. When Alice and Bob  have to communicate safely they use different keys to code and decode data. That is, Alice ciphers a message addressed to Bob with Bob’s public key and this can only be decoded by the corresponding Bob’s private key which I unique and strictly associated to the public one. Bob will cipher Alice’s message with her public key that only Alice will decode with her private key.

Cifratura a chiave asimmetrica

Here you have some abbbreviations very popular in Internet to refer to algorithms with asymmetric/public key.

  • RSA(Rivest - Shamir - Adleman)
  • DSA(Digital Segnature Algoritm)
  • Fortezza
  • Diffie-Hellman
These algorithms are used in e-commerce to assure safe transactions, that is safe code, password and credit number. They are used furthermore to sign digitally giving the concept of digital signature.

.

Applicazioni crittografia asimmetrica

   11/27   

Approfondimenti/commenti:

    Nessuna voce inserita

Inserisci approfondimento/commento

Indice percorso Edita
Edurete.org Roberto Trinchero