Sie sind auf Seite 1von 1

A trust relationship

Between two hosts means that the hosts can do two things: First, they can verify each others identity. Second, they can encrypt transmissions between each other. When establishing a trust relationship, keys can be distributed using two methods: Manually With manual distribution, you have to trade public keys with a recipient first, then encode messages to the recipients public key. Automatically In automatic distribution, Secure Sockets Layer (SSL) and certain versions of IPsec can exchange information in a reasonably secure manner through a series of data exchanges called handshakes.

Encryption Terminology
First, a Round is a discrete part of the encryption process. An algorithm generally submits information to several rounds. A higher number of rounds is preferable. Most symmetric-key algorithm rounds first process half of the unencrypted data, then process the second half. Then, each half is reprocessed to make the resulting encryption stronger. Separating information into rounds makes symmetric keys faster. In encryption, parallelization means the use of multiple processes, processors, or machines to work on cracking one encryption algorithm. Individual hosts can be parallelized using a parallel cluster server. Using such technology allows many different hosts to work together as one system to crack a piece of code. Two types of symmetric-key encryption algorithms exist: 1. block mode 2. stream-cipher mode 1. Block Mode Cipher algorithms encrypt data in discrete blocks. It is the more popular mode, because it is easier to verify the integrity of data before it is encrypted. Generally, the plain text will be padded up to be a multiple of the block size and then encrypted. This process makes the cipher text the size of the plain text, rounded up to the next multiple of 64 or 128 bits 2. Stream Cipher modes encrypt data (e.g., messages, network transmissions, and files) bit by bit in real time. Stream-cipher algorithms encrypt information by creating a key stream and then combining this stream with the document being encrypted. This method is much quicker than using block mode, especially when it is used on smaller bits of data. However, it is not considered to be as secure, because it cannot verify data during encryption.

Symmetric-Key Encryption
One key is used to encrypt and decrypt messages. Another name for symmetric-key encryption is single-key encryption.
Plain text input Encryption Cipher text Decryption Plain text input

Mary had a little lamb

4d53=b1d3r &J2Ier90>L

Mary had a little lamb.

Same key shared secret

Das könnte Ihnen auch gefallen