ITM 711 Lecture Notes - Lecture 8: Public Key Infrastructure, Cloud Computing Security, Public-Key Cryptography

19 views8 pages

Document Summary

Itm711: week 9, lecture #8 cloud security mechanisms. The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. Encryption technology relies on a standardized algorithm called a cipher to transform original plaintext data into encrypted data, referred to as ciphertext. The encryption mechanism can help counter the traffic eavesdropping, malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats. Symmetric encryption uses the same key for both encryption and decryption, both of which are performed by authorized parties that one shared key. It provides data confidentiality but no non-repudiation (in a party of more than 2 people). Asymmetric encryption relies on the use of two different keys, namely a private key and a public key. Cloud security mechanisms encryption private & public keys: Message that were encrypted with a private key can be correctly decrypted by and party with the corresponding public key.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents