AFM341 Chapter Notes - Chapter 12: Cryptographic Hash Function, Public-Key Cryptography, Symmetric-Key Algorithm
Document Summary
Encryption: is a preventative control whi ch provides confidentiality and privacy for data transmission and storage through using algorithmic schemes to encode plaintext into nonreadable form. Symmetric-key encryption: both the sender and the receiver use the same key to encrypt and decrypt messages. Asymmetric-key encryption: to transmit confidential information, the sender uses the receiver"s public key to encrypt the message; the receiver uses his or her own private key for decryption upon r eceiving the message. Also known as public -key encryption or two-key encryption. Private key: a string of bits kept secret and known only to the owner of the key. Public key: a string of bits created with the private key and widely distributed and available to other users. Authentication: a process that establishes the origin of information or determines the identity of a user, process, or device. Session key: a symmetric key that is valid for a certain timeframe only.