Notes for Computer Information Technology 160
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

November 21



set x |x| > m set A, |A| == 64

ascii -> printable 8-bit clean text

base64 characters are [A-Z a-z 0-9 + /]

= is for padding

Trusted Communications

  • who said it = Authentication
  • can’t be denied = Repudiation
  • message cannot be altered = Integrity

algorithm(message, key) = encrypted message



Public Key Encryption

You can encrypt data with a public key so that it can only be decrypted with a private key

You can sign data with a private key so it can be verified with a public key

When both of these are done you have trusted communication


proof that a public key belongs to a person marked by an authority