Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Public and private keys z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
A public key and a related private key are numerically associated
with each other. Therefore, any data encrypted using one of the key
values can only be decrypted using the other key value. Network protocols
take advantage of this in the following ways:
In practical terms, symmetric encryption algorithms, such as Data Encryption Standard (DES), perform much faster than asymmetric encryption algorithms. Therefore, public key protocols use a combination of symmetric and asymmetric encryption. For example, in SSL, the message data is symmetrically encrypted only after asymmetric encryption is used to exchange the symmetric encryption key. Also, to reduce the size of the message transmitted, the data to be digitally signed is compressed using a one-way hashing function before being encrypted with the signer's private key. The signature verifier then performs the same hashing function on the recovered data before comparing the signature. |
Copyright IBM Corporation 1990, 2014
|