home *** CD-ROM | disk | FTP | other *** search
- * Encryption, Public Keys and Otherwise
-
- PART One.
-
- If you know what "Public Key Encryption" is then feel
- free to skip to part two.
-
- Public Key Encryption is a special form of encryption
- which uses different keys for encryption (or scrambling) of
- a message and decryption (unscrambling, the reverse
- operation).
-
- The separate keys for each operation have several
- advantages. The first is that the encryption key can be
- distributed much more easily by less secure means without
- compromizing the security of future encrypted messages.
- Simple knoledge of the encryption key does not enable
- decrption of encrypted messages. The decryption key is
- reqired to recreate the original message. For this reason
- the encryption key is commonly called the "public key" and
- the decryption key is the "private key".
-
- In operation, everyone who wants to recieve secret
- messages creates their own pair of keys, one private and one
- public. The public key is them communicated to everyone who
- may want to send them a secret message. Perhaps a central
- key distribution center could be established. The private
- key is kept secret and never told to anyone.
-
- For example ... Art wants to send Beth a secret message.
- He would look up Beth's public key or ask her to send him
- one (in the clear). He would then use Beth's public key to
- encrypt his message and send her the encrypted message. Beth
- recieves the message and decodes it with her private key. No
- one else can decrypt the message even if they get a copy of
- the encrypted message AND the public key. They need the
- private key.
-
- In 1978 the CACM journal published a way of doing this
- on computers. The system they described has come to be known
- as the "RSA" cypto system.
-
- The RSA system has an additional property beyond the
- general Public Key Encryption system described so far. With
- the RSA system the keys are interchangeable so you can use a
- private key to encrypt a message and then only the
- coresponding public key will unscramble the message. This is
- in effect a "digital signature" which "signs" a message
- showing that the encrypted message could only have been
- created with knowlege of the private key.
-
- Messages can also be ecrypted more than once. For
- example you can sign a message with your private key and
- then encrypt the result again with the intended receiver's
- public key to make a signed, secret message. The receiver
- would then need to do the reverse two steps in the reverse
- order to get the original message back.
-
- Even more complex interaction can be used for special
- purposes. Articles have appeared on how to play poker over
- the phone and how to hold a secret ballot election over the
- phone and others.
-
-
- PART Two.
-
- I have recently completed a Public Key Encryption system
- based on the RSA system. It runs on MS-DOS using files for
- keys and messages. I am distributing the system as
- freeware/shareware. (PKSCrypt 0.0 or 0.01)
-
- There may be some legal or political considerations in
- this.
-
- I have heard roumors that this sort of stuff comes under
- certain restritions for export of high tech (or something)
- from the USA. I don't think this quite applies to me because
- I am exporting the system TO the USA. (I live in Canada).
-
- I have also heard roumors that some intelligence
- organization (unnamed) is discouraging public discusion (let
- alone utilization) of these systems. I have trouble
- believing this because I had no trouble finding all the
- inforamtion I could ever desire on the subject. There was
- even an article in Byte magazine and a couple follow-up
- letters.
-
- Anyone who has any solid info on this, I would like to
- hear from you. I especially would like to hear directly from
- any government organization(s) (in any country) who may
- think they are involved.
-
-
- Interested parties may contact me via Fido node 134/1.
-
- Lloyd Miller
- Calgary, Alberta
- 1986 Janualry 16
-