Skip to main content

Public Key Infrastructure Fundamental (Part 1)

Public key infrastructure is an infrastructure developed to ensure the data security that is being transfered within insecure network.

Public-Key Infrastructure
Source: Wikimedia

If we talk about PKI, we will talk about some common terms used in this area, such as encryption, digital signatures, public keys, private keys.

In Part 1 of this post, we will explore about the two terms, which are encryption and digital signatures. Public keys and private keys will be discussed in Part 2 of this post.

Encryption

Encryption can be considered as a process to disguise something as something else. This is most likely similar with people write letter to other using words that are understood just between them. This way, even if the letter is being stolen, the bad guy will not be able to read it and understand the content of it. Besides encryption, there is another term known as decryption. Decryption is basically the reverse process of encryption. It means that, we try to reverse the letter that is encrypted using strange words back to normal words that can be understood by human brain easier (or, in computer context, can be read by the computer, though it's not essentially the whole concept).

Encryption/decryption process has long been used in computer security to secure the data that is considered as private and can only be seen by certain persons. There are many algorithms exist to perform the encryption process, such as DES (Data Encryption Standard), 3DES (3 times encryption using DES), and AES (Advanced Encryption Standard). AES actually supersedes as standard encryption algorithm used by US Government.

The AES algorithm is commonly known as symmetric-key algorithm. Symmetric-key algorithm is an algorithm for that use shared secret-key to encrypt and decrypt the data. 3DES is one algorithm that is known to use symmetric-key concept. Other algorithms are blowfish, twofish, CAST-128, and IDEA.

Public-key cryptography, on the other hand, uses two different key to encrypt and decrypt the data. One used to encrypt is know as public key, whilst the other is known as private key. One algorithm that is known to use public-key cryptography is RSA. RSA stands for Ron RivestAdi Shamir and Leonard Adleman. They are the ones to publicly described it in 1978.

Public-Key Encryption
Source: Globus

Digital Signatures

Digital signature, as the name describes, is just like a human signature but in a digital format. This signature is used to proof the authenticity of the data that is transfered over the network. Valid digital signatures means that the data is the same as it is transfered by the sender and not being altered by irresponsible person.

Digital Signature Concept
Source: Wikimedia

As can be seen from the above diagram, the concept of digital signature is quite simple. The data's signature will be computed using hash algorithm and then encrypted using the signer's private key. The receiver will then decrypt the signature using the signer's public key and compare the value with the computed has value of the received data. If the value are the same, then the received can pretty sure that the data is valid and not tampered along the way.

Below are some reasons to use digital signatures:

  1. Authentication. By using the digital signature, we can make sure that the data sent is owned by specific user that is considered to be the sender.
  2. Integrity. By using the digital signature, we can make sure that the data sent is not being tampered by irresponsible person when being transferred.
  3. Non-repudiation. By using the digital signature, we can make sure that the sender, at some time in the future, cannot decline that he already signed the data.

Comments

Popular posts from this blog

Kisah Nyata Seorang Anak Bernama Andoy dari Filipina

This post is in Bahasa.
Ada seorang anak kecil kelas 4 SD yang selalu mengucap syukur dalam keadaan apapun. Ia tinggal di suatu desa di Negara Filipina. Setiap hari untuk sampai ke sekolahnya ia harus berjalan kaki melintasi daerah yang tanahnya berbatu dan menyeberangi jalan raya yang berbahaya dimana banyak kendaraan yang melaju kencang. Setiap kali berhasil menyeberangi jalan raya tersebut, Andoy selalu mampir sebentar ke Gereja untuk berdoa. Tindakannya ini diamati oleh Pdt. Agaton. Karena merasa terharu dengan sikap Andoy yang lugu dan beriman tersebut. Suatu hari ketika Andoy hendak masuk ke Gereja Pdt. Agaton menyapanya.
Bpk. Pdt : "Selamat pagi Andoy, apa kabarmu? Apakah kamu akan ke sekolah?"
Andoy : "Ya, Bapa Pendeta!" balas Andoy sambil tersenyum.
Bpk.Pdt : "Mulai sekarang saya akan membantu dan menemani kamu menyeberangi jalan raya tersebut setiap kali kamu akan menyeberang.
Andoy : Terima kasih, Bapa Pendeta."
Bpk. Pdt : "sekarang apa yang aka…

Blue Light Filtering with f.lux

Light, one of the very important parts of human living support, has tremendous benefit for us. Light itself is composed of many different rays. One of the components of light, called as blue light, has been known to tamper with our circadian rhythm.

Blue light itself can come from a lot of sources, including the lamp inside your room. However, the source which gives the most impact on people are from electronic devices. In this technology era, it's very hard for us to run away from using electronic devices. Those devices, such as Laptops and Handphones, have tremendously improve our quality of life by making our life easier and more fun through a lot of applications and systems available. Unfortunately, blue light emitted through the screen of those devices can affect our quality of sleep. Some research even advised us not to use our phone a few hours before we are going to sleep to improve our sleep quality.

For tech-savvy people, getting away from devices, especially handphone, …

Needlefish Attack

Just recently, a news spread about a young lady, died due to attack of a Needle fish. The story began when she was having a vacation with her family at Tanjung Karang beach, Makassar, Indonesia. This unfortunate event happened on January 01, 2016.



Liena (39) was soaking her body near the shoreline, whilst suddenly a needlefish jump towards her face. She was not able to dodge because it was too sudden. The fish, known with its long sharp and spear like snout, pierced through her right eyelids. She was then screaming for help. Her husband's family was then run to help her. She was quite badly injured. The wound was so deep that it even pierced through the skull and caused her to vomit blood.

She was brought to the hospital by ambulance to Kabelota Donggala hospital. Nevertheless, the wound was so bad that she eventually could not make it. She passed away in that hospital and the corpse was brought back to Balaikota Palu.



It's highly advised that we are keep being careful when playi…