CST 311 - Module 4

 Week 4

This week's material was focused on network security! There are many ways people can try to intercept and replay data packets being sent to and from network edges. This is not something that can cause damage in the real world and be very costly as well.

Some topics included cryptography, more specifically symmetric key and public key encryption. Symmetric key means that both clients (or client and server) use the same key to encrypt and decrypt data being sent to each other. Public key encryption is quite different as it uses a public key known to all who can see the packets. However, to decrypt, the receiver must use their private key known only to them in combination with the public key.

However, if data can be replayed or in other words clients can impersonate each other, then how does any of the encryption/decryption method benefit us. Well, there are a couple of key aspects to this. One being digital signatures, where the sender uses their own private key to encrypt a message. As well as Certification Authorities, which binds public keys to particular entities and offers a service of validation.

There is more material in the readings, however, as always, I will save the intricate details to keep this brief.

Comments

Popular posts from this blog

CST 300 - Module 4

CST 300 - Module 2

CST 300 - Module 3