Notes/UNB/Year 4/Semester 1/CS2418/9-27-2023.md

22 lines
995 B
Markdown
Raw Normal View History

2024-01-22 10:12:48 -04:00
Lecture Topic: Public Key Infrastructure
PKI protects information assets in several ways
- Authentication (using digital certificates)
- Integrity (content not changed)
- Privacy (secure information)
- Authorization (access control)
- Nonrepudiation (can validate action)
The Diffie Hellman key exchange provides no authentication of the two communicating partners, so it is vulnerable to man in the middle attacks
Digital envelopes are an application of public key encryption which can be used to protect a symmetric key, which can be used to protect a message without needing to first arrange for sender and receiver to have the same secret key
Randomness
Two criteria are used to valid a sequence of random numbers:
- Uniform Distribution: The distribution of the numbers should be uniform, that is the frequency of occurrence of each of the number should be approximately the same
- Independence: No one value in the sequence can be inferred from the others
Random vs Pseudorandom