This is not your father's cryptography!
Traditional cryptography systems work under the condition that both the sender and recipient each have a copy of the cipher key. The sender sends an email that was encrypted using his copy of the cipher key. Once received, the recipient decrypts it using her copy of the same cipher key. This system works because each party has a copy of the same cipher key.
But what if the recipient did not have a copy of the cipher key?
PUBLIC & PRIVATE KEYS
Cryptographers came up with several ingenious solutions. The one most widely used employs a public and a private key. Only the recipient needs to create these keys. It works like this:
- The recipient sends her public key to the sender.
- The sender uses her public key to encrypt the message and then sends the encrypted message to her.
- The recipient uses her private key to decrypt the message.
- The public key is given to anybody who wants to send encrypted mail to the recipient.
- The private key is the only key that can decrypt any message that was encrypted with its partner public key.
This weakness can be avoided in two ways:
- the public key is personally handed to the sender; or
- have an independent and trusted third party, called a Certificate Authority (CA), authenticate the recipient's identity and, thus, the authenticity of her public key. Authentication is done through a digital certificate.
CASUAL USERS
What about casual users? Is there a simpler way to exchange encrypted emails? There is and it's as simple as sending the cipher key to the recipient in one email and then following it up with a second email that contains the encrypted message.
This is a weak system but it's adequate for casual users.
IS THIS A BETTER SYSTEM?
I had a discussion about cryptography with an information security specialist recently. He described a method that uses private keys and doesn't involve a third party. He had no name for it but it works! Each party has a private key that never leaves the owner's possession.
The method solves the conundrum (raised at the beginning of this article) of sending an encrypted message to a recipient who doesn't have a copy of the cipher key.
First, the sender encrypts his message using his private key. He then sends it.Take note of the following. Each party has a private key. And there is no third party. I can't see any discernible flaws, can you?
Second, the receipient receives his encrypted message and then proceeds to encrypt it again using her private key. She then sends the double-encrypted message back to him.
Third, the sender decrypts his message. His message is now in clear text. He sends it back to her.
Finally, she decrypts the email using her private key and reads the clear text message.
It does require one thing and that's cryptographic software that can encrypt and decrypt a message that's already been encrypted without damaging it. I have not had the opportunity to investigate and find one yet. If you know of any, please contact me.
No comments:
Post a Comment