hardening
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
hardening [2022/08/23 09:11] – ash | hardening [2022/09/12 17:44] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | Hardening refers to providing various means of protection in a computer system. Protection | + | |
+ | === Encryption === | ||
+ | |||
+ | = What is encryption ? = | ||
+ | |||
+ | Encryption | ||
+ | - Authentication allows for the verification of a message’s origin | ||
+ | - Integrity provides proof that a message’s contents have not changed since it was sent | ||
+ | - Non-repudiation ensures that a message sender cannot deny sending the message. | ||
+ | |||
+ | = Asymetric encryption = | ||
+ | |||
+ | In asymmetric encryption - also known as public key encryption - the sender and the recipient use two different keys, a public key and a private key. Data encrypted with the public key can only be decrypted with the private key. | ||
+ | |||
+ | = Symmetric encryption = | ||
+ | |||
+ | In symmetric encryption, the same key both encrypts and decrypts data. For symmetric encryption to work, the two or more communicating parties must know what the key is; for it to remain secure, no third party should be able to guess or steal the key. | ||
+ | |||
+ | assymetric encryption symmetric encryption DES confidentiality | ||
+ | |||
+ | [[Nb: | ||
+ | |||
+ | 1001En | ||
+ |
/home/temper11/villages/digiterms.wiki/sandbox/data/attic/hardening.1661245862.txt.gz · Last modified: 2022/09/12 17:44 (external edit)