Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computing Knowledge, IT tools - Coggle Diagram
Computing Knowledge
Security
Encryption (Reversible)
i. Encryption Key
ii. Encryption Algorithm (AES)
iii. Decryption Key
iv. Key Store { for store the key}
v. plainText {Message}
vi. cipherText
-
Symmetric key ciphering algorithm
Asymmetric Encryption
- Public key and Private key
hashing algorithm : extend the length
SHA-256, MD-5
End to End encryption
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.[1]https://en.wikipedia.org/wiki/End-to-end_encryption
Singing (Signature)
Signing of data works to authenticate the sender of the data and tends to implement a form of encryption in its process. The process of signing emails, sensitive data, and other information has become necessary, as it verifies the identity of the sender and ensures the data has not been altered in transit. If a Man in the Middle attack occurred and the data was altered or compromised by the attacker, the recipient of the information would know that this has occurred. The attacker could alter the data, but as they do not have the key used by the sender to sign the data, the recipient of the data will know not to trust the sent data when analyzing the key and data.https://www.encryptionconsulting.com/education-center/encryption-and-signing/
a hash digest,
- confirms that the data has not been changed in transit. However, signing alone does not ensure the data has not been intercepted and read.
-
-
A) Programming
-
Backend
Java
Maven
Multi-Module Project with Mavenhttps://www.baeldung.com/maven-multi-moduleA multi-module project is built from an aggregator POM that manages a group of submodules
Benefits of Using Multi-Modules
- reduce duplication.
- build our application's modules in a single command
- share a vast amount of configuration with other modules.
Parent POM
- each pom.xml file has the implicit parent POM, it's called Super POM
-
-
-
-
-
-
-
-
-
-