Database Reference
In-Depth Information
•
Choose two large, random prime numbers n1 and n2.
•
Compute the product of n1 and n2. This product is also known as the limit L,
assumed to be larger than the largest integer ever needed to be encoded.
•
Choose a prime number larger than both n1 and n2 as the public key P
•
Choose the private key R in a special way based on n1, n2, and P
[If you are interested, R is calculated such that R * P = 1, modulo (n1-1) * (n2-1).]
The limit L and the public key P are made known publicly. Note that the private
key R may be computed easily if the public key P and the prime numbers n1 and
n2 are given. However, it is extremely difficult to compute the private key R if just
the public key P and the limit L are known. This is because finding the prime factors
of L is almost impossible if L is fairly large.
Data Exchange Example
Let us consider the use of public key encryption in a
banking application. Here are the assumptions:
•
Online requests for fund transfers may be made to a bank called ABCD. The
bank's customer known as Good places a request to transfer $1 million.
•
The bank must be able to understand and acknowledge the request.
•
The bank must be able to verify that the fund transfer request was in fact made
by customer Good and not anyone else.
•
Also, customer Good must not be able to allege that the request was made up
by the bank to siphon funds from Good's account.
Figure 16-12 illustrates the use of public key encryption technique showing the
banking transaction. Note how each transfer is coded and decoded.
ABCD Bank
Public Algorithm:
Encryption EE,
Decryption DD
Private Key:
ABCD-d
Meaningless
Text
Fund Transfer
Request
Apply
Good-e, EE
Meaningless
Text
Apply
ABCD-d,
DD
Meaningless
Text
Fund Transfer
Request
Private Key:
Good-d
Apply
ABCD-e,
EE
Public Keys
ABCD-e
Good-e
Apply
Good-d, DD
Customer Mr. Good
Figure 16-12
Public key encryption: data exchange.
Search WWH ::
Custom Search