Professional Documents
Culture Documents
key note
1-Encryption and Decryption calculator of RSA
https://www.mtholyoke.edu/courses/quenell/s2003/ma139/js/powermod.html
2-mod calculator
https://www.google.com/search?
q=42+mod+8&rlz=1C1CHBF_enPK919PK919&oq=42+mod+8&aqs=chrome..69i57j6.6140j0j7&sourceid=c
hrome&ie=UTF-8
3-gcd calculator
http://www.alcula.com/calculators/math/gcd/#gsc.tab=0
4- d =e^-1(mod n)
https://asecuritysite.com/encryption/inve?val1=71&val2=192
Authentication
is the process of recognizing a user's identity
prerequisite to allowing access to resources in
an information system.
Type 1 – Something You Know – includes passwords, PINs,
combinations, code words, or secret handshakes. Anything that
you can remember and then type, say, do, perform, or otherwise
recall when needed falls into this category.
Type 2 – Something You Have – includes all items that are
physical objects, such as keys, smart phones, smart cards, USB
drives, and token devices. (A token device produces a time-
based PIN or can compute a response from a challenge number
issued by the server.).
Type 3 – Something You Are – includes any part of the human
body that can be offered for verification, such as fingerprints,
palm scanning, facial recognition, retina scans, iris scans, and
voice verification