星期二, 5月 17, 2005

5/30 network secutiry and the theory of public key

Lecture on network secutiry and the theory of public key
(Chapter 3 of Textbook)

Secrect Key

*a key for encryption is also for decryption
*fast encryption and decryption
*problem with key distribution
*problem with keeping many keys

Public Key

*private key and public key
*public usually posted on an open directory
*private key must be kept in absolute private to oneself
*good for encryption and signature

Hash function
*fixed length of 128 or 256 bits
*fingerprint

do Lab Hash

Digital Signature
* privated key encrypted fingerprint of a plain text
*transmitted along with the plain text for verification

Man-in-the-middle attack

Digital Certificate
* Public Key signed with Certificate Authority



沒有留言: