ITM 703 Lecture Notes - Lecture 9: Symmetric-Key Algorithm, Non-Repudiation, Public-Key Cryptography

43 views4 pages

Document Summary

Clients on one side and provider on the other. Figure 10. 1: cloud service consumer is the sender, malicious service agent could be a software or some person, agent gets the data and data still remains confidential. Symmetric and asymmetric: symmetric encryption, same keys, asymmetric encryption. If you do the opposite, you encrypt the data with private key, anyone can decrypt the data with a public key: data is not confidential. 10. 1 encryption (3/3: does not offer confidentiality you encrypt the data with private key so do the opposite to achieve confidentiality, authenticity and data integrity issues. Figure 10. 2: https means secure communication between sender and receiver. Lock symbol: triangle symbol on https on a web browser means that the encryption applies not as strong (ex: 128-bit encryption, secure mechanism is ssl or tls. Computer security basic principles video on youtube: steps to protect yourself, 1. Protect information integrity: ex: use thunderbird, 2. Guarantee data confidentiality: use encryption, ex: truecrypt, 3.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents