Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography
Secure Socket Layer (SSL) Uses the protocol Tutorial 1 Tutorial 2
Cookies Basic usage Cookies tutorial for web developers
Public Key Cryptography Cryptography has been in use for 2,000 years – mainly for military use.military Simple XOR encryption: – Original – Encryption key – Result – meaningless! – Decrypted -> original.
Your message is prepared in plain text and is readable and printable by you and others... Your message is prepared in plain text and is readable and printable by you and others Original message Received message EncryptionDecryption ? Encrypted message Public Key Cryptography Private KeyReceiver’s Public Key
Public key cryptography (2)