ITM 703 Lecture Notes - Lecture 9: Symmetric-Key Algorithm, Non-Repudiation, Public-Key Cryptography
Document Summary
Clients on one side and provider on the other. Figure 10. 1: cloud service consumer is the sender, malicious service agent could be a software or some person, agent gets the data and data still remains confidential. Symmetric and asymmetric: symmetric encryption, same keys, asymmetric encryption. If you do the opposite, you encrypt the data with private key, anyone can decrypt the data with a public key: data is not confidential. 10. 1 encryption (3/3: does not offer confidentiality you encrypt the data with private key so do the opposite to achieve confidentiality, authenticity and data integrity issues. Figure 10. 2: https means secure communication between sender and receiver. Lock symbol: triangle symbol on https on a web browser means that the encryption applies not as strong (ex: 128-bit encryption, secure mechanism is ssl or tls. Computer security basic principles video on youtube: steps to protect yourself, 1. Protect information integrity: ex: use thunderbird, 2. Guarantee data confidentiality: use encryption, ex: truecrypt, 3.