Encryption

Uses for Public Keys/Private Keys
 * Encryption**
 * Strong Passphrase || Random, Length, Characters, Numbers, Case ||
 * DES || Data Encryption Standard. ||
 * PGB || Pretty Good Privacy ||
 * cipher || transform plaintext to mathematical ||
 * symetric key cipher || adding a number to the ASCII code, can be broken with brute force attack ||
 * Certificate || Used to authenticate, issued by certifying authority ||
 * Certifying Authority || A third party that has validated the identity of a website and issued a certificate. ||

1. Secure Messaging 2. Secure Storage -symetric key -pw management with hashes: encryption of hash 3. Authentication -digital signatures -signed message: encrypt with private key, decrypt with public 4. Non-repudiation -digital signature prove identity with private keys 5. Message Integrity -using hashes to check integrity of message


 * How Public Key Encryption Works**

Bob wants to send Alice an encrypted message.

1) Bob gets Alice's public key from the public key server. 2) Bob then encrypts the message using Alice's public key. 3) The message is sent to Alice. 4) Alice uses her private key to decrypt the message. A key cannot both encrypt and decrypt.

Bob wants to send a message to Alice that is digitally signed. 1) Bob encrypts the message using his private key. 2) The message is sent. 3) Alice gets Bob's public key from the public key server and uses it to decrypt the message. 4) The message must be from Bob because Bob is the only one that has his private key.