Download presentation
Presentation is loading. Please wait.
Published byDarrell Hawkins Modified over 8 years ago
1
CIA AAA
2
C I A
3
Confidentiality I A
4
Confidentiality Integrity A
5
Confidentiality Integrity Availability A
6
Confidentiality Integrity Availability Authentication A
7
Confidentiality Integrity Availability Authentication Authorization A
8
Confidentiality Integrity Availability Authentication Authorization Accounting
9
Encryption
10
Symmetric Shared Secret Key - very fast -but, how do I get the key to you first, so we can start using the shared secret key
11
Encryption Asymmetric Key
12
Encryption Asymmetric Key Each party has a key pair, one private and one public SLOW! BUT don’t need to send a secret key
13
Best Solution: Use public\private key pairs initially, just to exchange a secret shared key Switch to the secret key for fast processing! Espionage allegory
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.