Release 10.1A: OpenEdge Getting Started:
Core Business Services


Symmetric-key cryptography

The foundation of all PKI is public-key (also known as asymmetric-key) cryptography (see the "Public key cryptography" section), which it uses for the primary authentication services that it provides. However, while very secure, this is a relatively slow cryptographic technique. Therefore, a PKI uses symmetric-key cryptography for its combination of speed and strength to handle the encryption and decryption of actual data after it has already been authenticated. The PKI might generate the symmetric keys randomly using a Pseudo Random Number Generation function (PRNG), or it might use password-based encryption (less typical) to generate keys based on a user-supplied password (see the "Password-based encryption (PBE)" section). It then uses asymmetric-key cryptography to exchange and maintain the confidentiality of the symmetric keys used to encrypt and decrypt the data.


Copyright © 2005 Progress Software Corporation
www.progress.com
Voice: (781) 280-4000
Fax: (781) 280-4095