Notes for Computer Information Technology 160
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

nov21.md 1.0KB

1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
  1. <!-- this file is available at https://git.teknik.io/anthony_/cit160-notes -->
  2. # November 21
  3. ## Overview
  4. - AAA
  5. - Authn
  6. - 2-Factor
  7. - Encoding
  8. - [Base64](#base64)
  9. - Encryption
  10. - Keys (PEM)
  11. - [Trusted Communications](#trusted-communications)
  12. - SSL/TLS - SSH
  13. - [Certs](#certs)
  14. ## Base64
  15. set x |x| > m set A, |A| == 64
  16. ascii -> printable 8-bit clean text
  17. base64 characters are [A-Z a-z 0-9 + /]
  18. = is for padding
  19. ## Trusted Communications
  20. - who said it = Authentication
  21. - can't be denied = Repudiation
  22. - message cannot be altered = Integrity
  23. algorithm(message, key) = encrypted message
  24. t(w,k)=w[encrypted]
  25. t(w[encrypted],k)=w
  26. ### [Public Key Encryption](https://en.wikipedia.org/wiki/Public-key_cryptography)
  27. You can encrypt data with a **public** key so that it can only be decrypted
  28. with a **private** key
  29. You can **sign** data with a **private** key so it can be **verified** with a
  30. **public** key
  31. When both of these are done you have **trusted communication**
  32. ## Certs
  33. proof that a public key belongs to a person marked by an authority