Public Key Configuration; Asymmetric Key Algorithm Overview; Basic Concepts; Key Algorithm Types - HP 5120 EI Switch Series Configuration Manual

Hide thumbs Also See for 5120 EI Switch Series:
Table of Contents

Advertisement

Public key configuration

Asymmetric key algorithm overview

Basic concepts

Algorithm: A set of transformation rules for encryption and decryption.
Plain text: Information without being encrypted.
Cipher text: Encrypted information.
Key: A string of characters that controls the transformation between plain text and cipher text. It is
used in both the encryption and decryption.

Key algorithm types

The information in plain text is encrypted by an algorithm with the help of a key before being sent. The
resulting cipher text is transmitted across the network to the receiver, where it is decrypted by the same
algorithm with the help of a key to obtain the original plain text.
Figure 51 Encryption and decryption
Plain text
The following types of key algorithms are available, based on whether the keys for encryption and
decryption are the same:
Symmetric key algorithm—The keys for encryption and decryption are the same. Commonly used
symmetric key algorithms include Advanced Encryption Standard (AES) and Data Encryption
Standard (DES).
Asymmetric key algorithm—The keys for encryption and decryption are different, one is the public
key, and the other is the private key. The information encrypted with the public key can only be
decrypted with the corresponding private key, and vice versa. The private key is kept secret, and the
public key may be distributed widely. The private key cannot be practically derived from the public
key.

Asymmetric key algorithm applications

Asymmetric key algorithms can be used for encryption and digital signature.
Encryption—The sender uses the public key of the intended receiver to encrypt the information to be
sent. Only the intended receiver, the holder of the paired private key, can decrypt the information.
This mechanism ensures confidentiality.
Key
Cipher text
Encryption
Decryption
Key
Plain text
179

Advertisement

Table of Contents
loading

Table of Contents