You are on page 1of 2

Information security final paper

key note
1-Encryption and Decryption calculator of RSA
https://www.mtholyoke.edu/courses/quenell/s2003/ma139/js/powermod.html

2-mod calculator
https://www.google.com/search?
q=42+mod+8&rlz=1C1CHBF_enPK919PK919&oq=42+mod+8&aqs=chrome..69i57j6.6140j0j7&sourceid=c
hrome&ie=UTF-8

3-gcd calculator
http://www.alcula.com/calculators/math/gcd/#gsc.tab=0

4- d =e^-1(mod n)
https://asecuritysite.com/encryption/inve?val1=71&val2=192

Authentication
 is the process of recognizing a user's identity
prerequisite to allowing access to resources in
an information system.
Type 1 – Something You Know – includes passwords, PINs,
combinations, code words, or secret handshakes. Anything that
you can remember and then type, say, do, perform, or otherwise
recall when needed falls into this category.
Type 2 – Something You Have – includes all items that are
physical objects, such as keys, smart phones, smart cards, USB
drives, and token devices. (A token device produces a time-
based PIN or can compute a response from a challenge number
issued by the server.).
Type 3 – Something You Are – includes any part of the human
body that can be offered for verification, such as fingerprints,
palm scanning, facial recognition, retina scans, iris scans, and
voice verification

You might also like