From 62bb2326ce687c550d382f9d994c6a9903e21e14 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Tue, 16 Aug 2022 13:40:13 +1200 Subject: [PATCH] vault backup: 2022-08-16 13:40:13 --- content/notes/07-cryptography-applications.md | 50 +++++++++++++++++++ content/notes/comp-210.md | 1 + 2 files changed, 51 insertions(+) create mode 100644 content/notes/07-cryptography-applications.md diff --git a/content/notes/07-cryptography-applications.md b/content/notes/07-cryptography-applications.md new file mode 100644 index 000000000..4cacc4929 --- /dev/null +++ b/content/notes/07-cryptography-applications.md @@ -0,0 +1,50 @@ +--- +title: "07-cryptography-applications" +aliases: +tags: +- comp210 +- lecture +--- + + +interest doesn't have low level security +- this would decrease compatibility +- easier to add this at hosts and software layer + +# Layer model +- each layer of network hides information about lower levels and adds information for higher levels\ +- transmission is only at physical layer + +OSI model - more complicated but most common + +TCP model +- application (http etc) +- transport (tcp etc) +- network (IP) +- data link (ethernet, wifi) +- physical layer + +# End to end principle +- add "smarts" at the endpoints +- easier to change these than the middle + - keep middle simple, scalable, dumb +- KISS + +# security not built in +- originall no security +- security was added + - http -> https + - ssl (secure socket layer) has been replaced by tls + - tls (transport layer security) + - ftp - sftp (file transfer) + - scp (secure copy) + - ssh (secure shell) + +# security certificates +- client needs to authenticate the server + - also vice versa +- need to establish secure connection +- trusted third parties are used to sign server host's certificates +- "tree of trust" +- based on public key crypto + diff --git a/content/notes/comp-210.md b/content/notes/comp-210.md index fd5d3d5e3..893ef5475 100644 --- a/content/notes/comp-210.md +++ b/content/notes/comp-210.md @@ -30,4 +30,5 @@ No final exam - [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md) - [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md) - [05-cryptography](notes/05-cryptography.md) +- [06-hashing-binary-public-key-cryptography](notes/06-hashing-binary-public-key-cryptography.md) - \ No newline at end of file