Notes for Computer Information Technology 160
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

November 21



set x |x| > m set A, |A| == 64

ascii -> printable 8-bit clean text

base64 characters are [A-Z a-z 0-9 + /]

= is for padding

Trusted Communications

  • who said it = Authentication
  • can’t be denied = Repudiation
  • message cannot be altered = Integrity

algorithm(message, key) = encrypted message



Public Key Encryption

You can encrypt data with a public key so that it can only be decrypted with a private key

You can sign data with a private key so it can be verified with a public key

When both of these are done you have trusted communication


proof that a public key belongs to a person marked by an authority