Lecture on network secutiry and the theory of public key
(Chapter 3 of Textbook)
Secrect Key
*a key for encryption is also for decryption
*fast encryption and decryption
*problem with key distribution
*problem with keeping many keys
Public Key
*private key and public key
*public usually posted on an open directory
*private key must be kept in absolute private to oneself
*good for encryption and signature
Hash function
*fixed length of 128 or 256 bits
*fingerprint
do Lab Hash
Digital Signature
* privated key encrypted fingerprint of a plain text
*transmitted along with the plain text for verification
Man-in-the-middle attack
Digital Certificate
* Public Key signed with Certificate Authority
訂閱:
張貼留言 (Atom)
沒有留言:
張貼留言