Generating the session key list Source Address Dest Address Last Session Key Key ID MD5 Hash (Session Key) Next Key ID Session Key List RSA Encrypt Server Private Key Server Key Server rolls a random 32-bit seed as the initial key ID Server generates each session key as hash of IP addresses and key ID Low order 32 bits of the session key become the key ID for the next session key Server encrypts the last key using RSA and its private key to produce the server key Server uses the session key list in reverse order and generates a new one when exhausted Mar 22, 2019 14

03/18/19 18:25 13-27 Public Key Cryptography 0 Public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. 0 Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. 0 The asymmetric key algorithms are used to create a mathematically related key pair: a secret private key and a published public key. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. 0 It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.

03/18/19 18:31 13-64 Public Key Cryptography 0 Public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. 0 Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver. 0 The asymmetric key algorithms are used to create a mathematically related key pair: a secret private key and a published public key. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. 0 It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.

MapReduce Flow Input = Key, Value Key, Value … Map Map Map Key, Value Key, Value Key, Value Key, Value Key, Value Key, Value … … … Sort Reduce(K, V[ ]) Output = Key, Value Key, Value … Split Input into Key-Value pairs. For each K-V pair call Map. Each Map produces new set of K-V pairs. For each distinct key, call reduce. Produces one K-V pair for each distinct key. Output as a set of Key Value Pairs.

MapReduce Flow Input =Key, Value Key, Value … Map Map Map Key, Value Key, Value Key, Value Key, Value Key, Value Key, Value … … … Sort Reduce(K, V[ ]) Output =Key, Value Key, Value … Split Input into Key-Value pairs. For each K-V pair call Map. Each Map produces new set of K-V pairs. For each distinct key, call reduce. Produces one KV pair for each distinct as key. Output a set of Key Value Pairs. 219 MIAS Tutorial Summer 2011

Major Issues Involved • Choosing the proper airfoil that is easily constructed as well as providing the highest lift and necessary drag. • Designing proper wing flaps to stabilize control and functionality. • Designing a proper tail to optimize control and aerial performance. • Determining the proper angle of attack to insure takeoff.

Public-key Encryption Public-key encryption uses two different keys at once -- a private key and a public key. The private key is known only to one computer, the public key is available to all. Use the receiver’s public key to encrypt your message. Only the possessor of the private key can decrypt the message. A message encrypted with a private key, can be decrypted with the corresponding public key. The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. The encryption is computationally intensive. Used together with symmetric-key encryption. Succeeding with Technology – 3rd Edition

Example 10: PV of Uneven Cash Flows BA II Plus Calculator Press CF Press 2nd KEY then CE|C KEY then ENTER then 2ND KEY then CPT KEY CF0 = 0, press Enter and ↓ key CF1 = 100, press Enter and ↓ key F01 = 1, press Enter and ↓ key CF2 = 200, press Enter and ↓ key F02 = 1, press Enter and ↓ key Press NPV KEY I = 10, press Enter and ↓ key Press CPT KEY NPV = $256.20 6-33