Information Systems Security Essay examples
These security requirements are represented in Figure 1, Classic Critical Security Requirements. This figure …show more content…
Asymmetric ciphers make public keys widely available for encrypting information, but only one individual possesses a private key to decrypt or decipher that information, and vice versa. Asymmetric cryptography, invented by Diffie and Hellman in 1975, can be used to authenticate a source such as a digital signature. RSA, named for Rivest, Shamir, and Adleman who first described this process and make it public, is an example of an asymmetric cipher algorithm. RSA uses a public key, available to everyone for encrypting messages. RSA then applies a limited-availability private key for decryption by the end user as represented in Figure 3 below.
Secure Socket Layer (SSL) encryption technologies also offer controls for non-repudiation to provide communications and data security over the internet. SSL uses asymmetric cryptography for privacy as well as keyed message authentication for message reliability. A Trusted Third Party (TTP) is often used for authentication in order to successfully implement non-repudiation controls. Just as a notary public will validate a signature, SSL certificates validate a user's transactions on the internet. Figure 4 below depicts two users making a data transaction across the internet.
This representation demonstrates data sent from User #1 and User #2 through the