Notes/UNB/Year 4/Semester 1/CS2418/9-27-2023.md
2024-01-22 10:12:48 -04:00

995 B

Lecture Topic: Public Key Infrastructure

PKI protects information assets in several ways

  • Authentication (using digital certificates)
  • Integrity (content not changed)
  • Privacy (secure information)
  • Authorization (access control)
  • Nonrepudiation (can validate action)

The Diffie Hellman key exchange provides no authentication of the two communicating partners, so it is vulnerable to man in the middle attacks

Digital envelopes are an application of public key encryption which can be used to protect a symmetric key, which can be used to protect a message without needing to first arrange for sender and receiver to have the same secret key

Randomness Two criteria are used to valid a sequence of random numbers:

  • Uniform Distribution: The distribution of the numbers should be uniform, that is the frequency of occurrence of each of the number should be approximately the same
  • Independence: No one value in the sequence can be inferred from the others

Random vs Pseudorandom …