
Glossary: Prime Pages: Top 5000: 
Cryptosystems all involve a keya piece of information
necessary to encrypt information. This could be in the
form of a onetime pad, such as the string of binary bits
used by the Vernam cipher; or a 56bit number as used in
the U. S. Data Encryption Standard. For conventional
cryptosystems, these keys must be kept secretso they must
be exchanged carefully. One way to do this is by the
DiffieHellman key exchange system.
In a public key cryptosystem the key is made public. For example, with the RSA encryption system, two numbers (n, e) are made public. (A separate private key (n, d) for decryption is kept secret.) RSA, like most all of the public key cryptosystems that are regarded as secure, are based on number theory techniques that involve the multiplication of large integers [Odlyzko94]. It s known how to break these systems, but the computational burden usually can be made far beyond our current capabilities by increasing the key size. Another advantage of public key systems is that they allow for digital signaturesways of verifying the source of the document. Most conventional systems also allow digital signature, but usually in a more award manner. However, conventional cryptosystems tend to be computationally easier and many times faster than most public key cryptosystems. For that reason systems such as the IS54 authentication system for North America digital cellular systems uses a sequence of shared secrets and challengeresponse techniques, rather than a public key system, to verify the identity of mobile phone units. Many of the public key systems are also patented by private companies, this also limits their use. For example, MIT filed for a patent on RSA which was granted in 1983 (U.S. patent #4,405,829). The three founders of RSA created RSA Data Security and later the RSA patent and several other public key patents were exclusively licensed to its spinoff Public Key Partners. For several years Jim Bidzos, this last group’s president, threaten to sue Pretty Good Privacy for their use of RSA in their PGP encryption freeware. PGP claimed it used the algorithm, but not RSA code. This threat was eventually removed when RSA offered a toolkit RSA REF for the algorithm which is free for non commercial use. PGP now uses this toolkit instead of their own code.
Related pages (outside of this work)
References:
Chris K. Caldwell © 19992018 (all rights reserved)
