Notes for Computer Information Technology 160
Vous ne pouvez pas sélectionner plus de 25 sujets Les noms de sujets doivent commencer par une lettre ou un nombre, peuvent contenir des tirets ('-') et peuvent comporter jusqu'à 35 caractères.

nov21.md 1.0KB

November 21

Overview

Base64

set x |x| > m set A, |A| == 64

ascii -> printable 8-bit clean text

base64 characters are [A-Z a-z 0-9 + /]

= is for padding

Trusted Communications

  • who said it = Authentication
  • can’t be denied = Repudiation
  • message cannot be altered = Integrity

algorithm(message, key) = encrypted message

t(w,k)=w[encrypted]

t(w[encrypted],k)=w

Public Key Encryption

You can encrypt data with a public key so that it can only be decrypted with a private key

You can sign data with a private key so it can be verified with a public key

When both of these are done you have trusted communication

Certs

proof that a public key belongs to a person marked by an authority