ITM 711 Lecture Notes - Lecture 8: Public Key Infrastructure, Cloud Computing Security, Public-Key Cryptography
Document Summary
Itm711: week 9, lecture #8 cloud security mechanisms. The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. Encryption technology relies on a standardized algorithm called a cipher to transform original plaintext data into encrypted data, referred to as ciphertext. The encryption mechanism can help counter the traffic eavesdropping, malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats. Symmetric encryption uses the same key for both encryption and decryption, both of which are performed by authorized parties that one shared key. It provides data confidentiality but no non-repudiation (in a party of more than 2 people). Asymmetric encryption relies on the use of two different keys, namely a private key and a public key. Cloud security mechanisms encryption private & public keys: Message that were encrypted with a private key can be correctly decrypted by and party with the corresponding public key.