4.0 AUTHENTICATION

Get Started. It's Free
or sign up with your email address
Rocket clouds
4.0 AUTHENTICATION by Mind Map: 4.0 AUTHENTICATION

1. Purpose

1.1. A way to prove to one entity that another entity is who it claims to be.

2. Application Technologies

2.1. Example:

2.1.1. Cidos

2.1.2. IPUO

2.1.3. User Authentication

3. Various Attacks

3.1. Man in the middle

3.2. Brute Force attack

3.3. Dictionary attack

4. Using Encryption

4.1. Process of encoding message in such a way that hackers cannot read.

4.2. Converting data to a format that is meaningless to anyone who does not have the proper key.

5. Using Digital Signatures

5.1. Mathematical technique to validate the message.

6. How encryption can protect data from snooping and protect data being altered

6.1. STEP 1

6.1.1. Select key and encrypt

6.2. STEP 2

6.2.1. Give key and ciphertext to receiver (separately)

6.3. STEP 3

6.3.1. Use key to decrypt ciphertext

6.4. PLAINTEXT

6.4.1. CIPHERTEXT

6.4.1.1. PLAINTEXT

6.4.1.2. encryption

6.4.2. decryption

7. Differentiate

7.1. Symmetric algorithm

7.1.1. Shared the same key for encryption and decryption (Private key)

7.1.2. Key need to be keep secret

7.2. Asymmetric algorithm

7.2.1. Use pair of keys, one for encryption and another one for decryption (Private key and public key )

7.2.2. Decryption key is typically keep secret called private key and secret key while encryption key is spread to all who might want to send encrypted message is called public key

8. Digital Signatures

8.1. Define

8.1.1. A digital signatures uses to private and public keys of the sender

8.2. Describe

8.2.1. A type of electronic signature that encrypt document with digital codes that are particularly difficult to duplicate

8.3. Features

8.3.1. Depends on the message

8.3.2. Easy to generate

8.3.3. Authentication

8.3.4. Easy to verified

8.3.5. Not to be forged computationally

8.3.6. Could be copied

8.4. Function

8.4.1. Authentication

8.4.2. Integrity

8.4.3. Non-repudiation

8.4.4. Imposter prevention

8.5. Illustrate process:

8.5.1. Sender

8.5.1.1. Hash algorithm

8.5.1.1.1. Hash Value

9. Cryptographic Terminologies

9.1. Encryption

9.1.1. Converting plaintext to ciphertext

9.2. Ciphertext

9.2.1. Original form message that can be read

9.3. Decryption

9.3.1. Process recovering ciphertext from plaintext

9.4. Cryptanalysis

9.4.1. Method of deciphering ciphertext without knowing key

10. Describe message authentication using cryptographic

10.1. To verified that message come from the allerged source and have not been alter

10.2. Message authentication concerned

10.2.1. Protecting the integrity of a message

10.2.2. Validating identity of originator

10.2.3. Non-repudiation of origin

11. Software to secure data over the network:

11.1. ABC Chaos

11.1.1. is a simple tool to encrypt text files, images, documents, programs or entire folders.

11.2. SafeCryptor

11.2.1. SafeCryptor fully encrypts your data before it leaves your computer

11.3. Polar Crypto Light

11.3.1. is simple to use, yet supports the securest, most recommended

11.4. EncryptOnClick

11.4.1. Is a program, that lets you securely encrypt and decrypt files/data