Free Essay

Iaad

In:

Submitted By terryaddison
Words 647
Pages 3
Terry Addison

IAAS483

DAVENPORT UNIVERSITY ONLINE

August 9, 2011

Dan Parrell, PhD

Certificate of Authorship: By submitting this assignment I hereby certify that I am the author of this assignment. I understand that all coursework is governed by the University Academic Integrity Statement outlined in the DU catalog. I have not consulted or collaborated with anyone else outside of the Davenport University Online classroom environment. I understand that I may use reference material, but my submission should reflect my individual effort and any material utilized outside of the course textbook must be properly referenced and documented using APA format.
Digital Signatures
A digital signature is a way to ensure that an electronic document is authentic. Digital signatures rely on certain types of encryption to ensure authentication. There are several ways to authenticate a person or information on a computer:
Digital certificates - To implement public key encryption on a large scale, such as a secure Web server might need, requires a different approach. This is where digital certificates come in. A digital certificate is essentially a bit of information that says the Web server is trusted by an independent source known as a Certificate Authority. The Certificate Authority acts as the middleman that both computers trust. It confirms that each computer is in fact who they say they are and then provides the public keys of each computer to the other.
Private key encryption -Private key means that each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to the other computer. Private key requires that you know which computers will talk to each other and install the key on each one.
Password - The use of a user name and password provide the most common form of authentication. You enter your name and password when prompted by the computer. It checks the pair against a secure file to confirm. If either the name or password do not match, then you are not allowed further access.
CRC (Cyclic Redundancy Check) - CRCs are similar in concept to checksums but they use polynomial division to determine the value of the CRC, which is usually 16 or 32 bits in length. The good thing about CRC is that it is very accurate. If a single bit is incorrect, the CRC value will not match up. transmission, but provide little protection from an intentional attack on your data. The encryption techniques below are much more secure.
Public key encryption - Public key encryption uses a combination of a private key and a public key. The private key is known only to your computer while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key provided by the originating computer and it's own private key.
How It Works
Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you.

1. You could copy and paste the contract into an email note.

2. Using unique software, your obtain a message hash of the contract.

3. Make use of the private key that you obtained from a public-private key authority to encrypt the hash

4. The encrypted hash becomes your digital signature of the message.

Your lawyer receives the message makes a hash of the received message. He then uses your public key to decrypt the message hash. The hashes match and everything is copasetic.

References

Digital signature (electronic signature). (n.d.). Retrieved August 9, 2011, from http://searchsecurity.techtarget.com/definition/digital-signature

Digital Signatures Featured Articles. ( n.d.). Retrieved August 9, 2011, from http://www.ehow.com/digital-signatures/

Similar Documents

Free Essay

Singko

...Singko… Uno,dos ,tres,kwatro, isama mo pa ang incomplete limang choices na nga singko pa matatapat sayo, hay! buhay estudyante nga naman.Sa isang buong sem natin na pag-upo sa apat na sulok ng kwarto sa kada tatlong oras o higit pa na paghihintay matapos lng ang klase may nagawa ba tayo para maiwasan ang singko? Mag aapat na taon na ko sa kolehiyo, nakatutuwang isipin naranasan ko na lahat, nakatutuwa nga ba? cguro? Kasi dagdag experience nga naman, mag add,magchange,magcomplete,magremoval,mauno,mados,tres at higit sa lahat ang kulay pulang singko.Sa unang taon,balewala pa pero pag nasa ikaapat at ikatlong taon kna bongga!ito na ang ikasasakit ng ulo mo mga behind na ang hirap iaad dahil sa conflict sa schedule. Ano na nga bang role ng singko sa buhay ng mga estudyante? Sa mga estudyanteng ndi nakaranas nito galing nyo saludo ko sa inyo, sa ilan namang nagdrop na agad bago pa masingko ang agap niyo. At sa mga naka tanggap na nito hindi ito ang sisira sa buhay kolehiyo kundi ito ang magsisilbing paalala na minsan tayong nagpabaya at ito ang magsisilbing instrumento upang doblehin ang pagsisikap,maging matatag at maagap upang sa hinaharap maabot ang pangarap. Isinulat ko ito hindi para mang inspire maka singko kundi para gisingin ang kamalayan ng mga kolehiyong nawawalan ng pag asang mag aral lalong lalo na sa mga cfy na nasasampulan ng 5 sa math 100 at 105 simula palang ito marami pang...

Words: 321 - Pages: 2

Free Essay

Brand

...Áàòëàâ. ÎÓÌàðêåòèíãèéí áàã ................. /äîêòîð (PhD) äýä ïðîô .Á. Íàðàíãýðýë / Äèïëîìûí óäèðäàã÷ áàãø ................. /äîêòîðàíò Ì.Îþóíöýöýã / Áàêàëàâðûí òºãñºëòèéí àæëûí òºëºâëºãºº …………………Ìàðêåòèíã...............…………………ìýðãýæëèéí àíãèéí îþóòàí .………….........îâîãòîé……………...................-íû òºãñºëòèéí àæëûí ñýäýâ: .........Ìàðêåòèíãèéí òºëºâëºãººã áîëîâñðîíãóé áîëãîõ íü. ............ |ÿéöýòãýõ àæèë |Õóãàöàà |Áèåëýëò | | | | | |Íýãä¿ãýýð á¿ëýã : Ìàðêåòèíãèéí òºëºâëºãºº |2003-4-1 |2003-4-10 | |Áîëîâñðóóëàõ îíîë àðãà ç¿é | | | |1.1 Ìàðêåòèíãèéí òºëºâëºãºº, ò¿¿íèé àãóóëãà , | | | |á¿òýö á¿ðýëäýõ¿¿í | | | |1.2 Ìàðêåòèíãèéí òºëºâëºãººã áîëîâñðóóëàõ | | | |çàð÷èì, ¿å øàò | | ...

Words: 18496 - Pages: 74

Free Essay

Random Process(Chinese Edition)

...: Ëæ»ú Ê ¼þ¼°Æä¸ÅÂÊ, Ëæ»ú±äÁ¿¼°Æä·Ö ²¼ , ¶à ά Ëæ»ú ±ä Á¿¼°Æä ²¼ , Ëæ»ú ±ä Á¿µÄÊý×ÖÌØ Õ÷, ¼«ÏÞ ·Ö ¶¨ Àí , Ëæ»ú ¹ý ³Ì µÄ»ù±¾¸ÅÄî , Âí ¶û ¿É·ò ¹ý ³Ì , ƽ ¹ý ³Ì , ƽ ¹ý ³Ì µÄÆ× Îö , ÿÕ ÎÈ ÎÈ ·Ö ¾ù¸½ÓÐ Ï° Ìâ , ¹©Ñ§ÉúÁ· Ï° Ö® ¡£ Óà ±¾ ÊéÊÇ¸ß Ð£¹¤ ¿Æ Àí ¿Æ( ·Ç Êýѧϵ ¡° ¸ÅÂÊÂÛ ¡¢ ) ÓëËæ»ú¹ý ³Ì ¡± ³Ì µÄ½Ì²Ä¡£ ±¾ ¿Î ÊéÒ² ¿É×÷Ϊ ¸ß µÈѧУÀí¹¤ ¿Æ ר Òµ±¾ ѧÉú¼°½Ìʦ µÄ½Ì²ÄºÍ ½Ìѧ²Î ¿¼Êé , Ò²¿É¹©¿Æ ¹¤ ×÷ÕßÔÄ ¸÷ ¿Æ ¼¼ ¶Á¡£ ͼ Êé ÔÚ°æ ±à Ä¿ ( CIP) Êý ¾Ý ¸ÅÂÊ Óë »ú¹ý³Ì/ ºú ϸ ±¦ , Ëï ºé Ïé ±à Öø, ±±¾© ±±¾© ÂÛ Ëæ : ÓÊµç ´ó ѧ³ö °æÉç , 2001 .2 ISBN 7- 5635-0435-4 ¢ñ .¸Å¡¢ò. ¢Ùºú ¡- ¢ÚËï ¡¢ó. ¢Ù¸ÅÂÊ ¢ÚËæ»ú¹ý ³Ì ÂÛ ¢ô .021 ÖÐ °æ±¾ ¹ú ͼÊé¹Ý CIP Êý¾Ý ×Ö(2001) µÚ 01788 ºÅ ºË Êé ±à ³ö °æ Ãû: ¸ÅÂÊ ÓëËæ ÂÛ »ú¹ý ³Ì Öø: ºú ϸ ±¦ Ëï ºé Ïé Õß: ±±¾© µç ´ó ѧ³ö °æÉç ( ±±¾© º£ µí ÇøÎ÷ ÍÁ³Ç · 10 ºÅ) ÓÊ ÊÐ ÓÊ : 100876 µç »° : 62282185 62283578 ±à Íø Ö· : http :/ / www .buptpress .com Ïú : ¸÷ µØРÊéµê »ª Ë¢: ±±¾© Ô´º£ Ó¡Ë¢³§ Êý: 1 - 4000 ²á ±¾: 850 mm¡Á1 168 mm 1/ 32 ´Î : 2001 Äê 2 Ô 1 °æ µÚ ºÅ : ISBN 7-5635-0435-4/ O .28-4 ¼Û 18 . 0 Ôª : 0 Ó¡ÕÅ 10 .5 : ×Ö Êý: 261 ǧ×Ö Ôð ÈÎ ±à ¼- : ÂíÏà ƽ ¾Ó¡ Ó¡ ¿ª °æ Êé ¶¨ 2001 Äê 2 Ô 1 ´Î Ó¡Ë¢ µÚ ¡° ¸ÅÂÊ ÓëËæ , ÂÛ »ú¹ý ³Ì ¡± Ò»Ö± Ò»ÃÅ ÊÇ ºÜ¾ßÌØÉ«ÓÖ ¾ßÖØ ÒªµØλ µÄ¹¤ ³Ì Êýѧ¿Î ¡£ µ±Ç°, ¸Ä¸ï Ö® Õý´µ ±é¸ß µÈ½ÌÓý½ç, ¿Î ³Ì ÖØ , ÄÚ ¸ÄÔìÓëѧʱµ÷ÕûµÄºô ÉùÈÕ ·ç ×é ÈÝ Òæ ÕÇ ÔÚ ÐÎÊÆ ¸ß , ´Ë ϱ±¾© µç ´ó ѧÀí ѧԺ Êýѧ²¿ ¶Ô¸ÅÂÊ ÓëËæ»ú ÓÊ ÂÛ ¹ý ³Ì µÄ½Ìѧ½øÐÐ Á˸ĸï ̽Ë÷, ±¾Êé µÄ³ö °æÒ² ÊÇÒ»¸ö ¸Ä¸ï ̽Ë÷µÄ ½á¹û ¡£ Ãæ ¶Ô¿Æ Ñ§¼¼ ÊõµÄѸËÙ Õ¹ÒÔ ·¢ ¼°¶ÔÈ˲ÅÒªÇóµÄÌá...

Words: 75075 - Pages: 301

Free Essay

Biography

...От темы к теме 1 От темы к теме BIBLIOTHECA ISLAMICA Серия основана в 2001 году Том третий Teologia Islamica Москва Muslim Media Press Фонд «Мир образования» 2004 2 Шамиль Аляутдинов От темы к теме Канонический редактор, магистр филологии и богословия университета “аль Азхар” имам Ильдар Аляутдинов Москва Muslim Media Press Фонд «Мир образования» 2004 3 УДК 297.14 ББК 86.38 А 60 От темы к теме Аляутдинов Ш. А 60 От темы к теме. – М.: Фонд «Мир образования», 2004. – 491 с. – (Bibliotheca Islamica; т. 3). ISBN 5 – 901851 – 01 – 3 (т. 3) ISBN 5 – 901851 – 12 – 9 “Ни один сосуд не вмещает в себя больше своего объема, кроме сосуда знаний, – он постоянно расширяется”. Серия “Bibliotheca Islamica” пополнилась еще одним томом – тре тьим. Эта книга – результат кропотливой, неустанной работы в течение года, хотя многие исследования, мысли, пожелания читателей, окончательно оформившиеся здесь, имеют значительную предысторию. Целью и задачей автора было предоставление достоверной, максимально выверенной информации, для чего скрупулезно изучались и сопоставлялись богословские тонкости из наиболее авторитетных источников исламской науки. Безусловно, автор стремился не только предоставить глубокие знания читателю, под водя к величайшей жизненной мудрости, но и научить применять эти знания на практике, для чего общепризнанная классика исламской теологии проецировалась на сегодняшние реалии, с учетом комментариев современных...

Words: 109706 - Pages: 439