Page 95 - Intelligent Communication Systems
P. 95

78       INTELLIGENT COMMUNICATION  SYSTEMS
            •  Fast Encryption Algorithm (FEAL):  The fast encryption  algorithm  (FEAL)
        was invented by NTT, Japan, in  1985.  Its key length is 64 bits. The text is broken
        into  64-bit-long  components  and  each  component  encrypted  and  decrypted  the
        same  way  at  source  and  destination,  respectively.  The  several  versions  of  FEAL
        (FEAL-4, FEAL-8, FEAL-16, and FEAL-32) differ in the number of times the algo-
        rithm is applied.  In the case of FEAL-4,  for example, the encryption algorithm is
        applied four times to get the scrambled text.


        7.9.3.2 Problems with Symmetric  Key  Encryption
        The major problem  with symmetric key encryption is how to keep the symmetric
        key secret and how to send it to the destination  safely,  without attack. There is a
        great  possibility  that the key could be  stolen  by a hacker while  sending  it to the
        destination over the Internet. To avoid this, unencrypted text should never be trans-
        mitted without first being scrambled. Another problem is that the number of keys
        is increasing as the number of customers increases.

        7.9.3.3 Public Key Encryption Algorithm
        To  overcome  the  problems  with  the  symmetric  key  method,  the  asymmetric
        (public) key encryption  algorithm  was invented by W. Diffie  and M. E. Hellman
        of  Stanford  University  in the  1970s. In this  method,  different  keys  are  used  for
        encryption and decryption. The encryption key is public, but the decryption key is
        private and secret. The decryption key is a prime  factor  obtained  from  factoring
        the encryption key. That is, the number of keys is twice the number of customers.
        The customer keeps his or her own key  secret.
            With  the  Rivest-Shamir-Adleman  encryption  method  (RSA),  which  was
        invented  by R. L. Rivest, A.  Shamir, and L. Adleman in  1977  and based  on the
        Diffie-Hellman  method, it takes a lot of time to find a prime factor from the public
        key. For example, for a number with 200 digits  it would take over 380,000 years
        to discover a prime factor, even using a supercomputer. Thus, rinding a prime factor
        is practically impossible. This is the principle behind the RSA encryption  method.
        Its  major  defect is that encryption  and decryption take more  time than with  the
        symmetric key method.

        7.9.3.4 Hybrid  Method
        The hybrid method is a combination of symmetric and asymmetric key encryption.
        In this method, a public key is given. A symmetric key is encrypted  by means of
        the public key. At the same time, the text is encrypted with the symmetric key. Then
        the  scrambled  symmetric  key and the  scrambled  text are sent  to the  destination
        over the Internet. At the destination, using the private key that corresponds  to the
        public key, the scrambled  symmetric key is decrypted to produce the original  sym-
        metric key. Then the scrambled text is decrypted using the symmetric key. Finally,
        the original text is obtained.
   90   91   92   93   94   95   96   97   98   99   100