McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Security
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Security Topics
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Cryptography
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Cryptography components
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Encryption and decryption
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
In cryptography,
the encryption/decryption algorithms
are public; the keys are secret.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Symmetric
-
Key Cryptography
Traditional Cipher
Block Cipher
Operation Modes
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Symmetric
-
key cryptography
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
In symmetric
-
key cryptography, the
same key is used by the sender (for
encryption) and the receiver (for
decryption). The key is shared.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
In symmetric
-
key cryptography, the
same key is used in both directions.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Symmetric
-
key cryptography is often
used for long messages.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Caesar cipher
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Example of monoalphabetic substitution
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
In monoalphabetic substitution, the
relationship between a character in the
plaintext to the character in the
ciphertext is always one
-
to
-
one.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Vigenere cipher
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
In polyalphabetic substitution, the
relationship between a character in the
plaintext and a character in the
ciphertext is one
-
to
-
many.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Transpositional cipher
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Block cipher
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
P
-
box
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
S
-
box
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Product block
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
DES
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
General scheme of DES
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Iteration block
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Triple DES
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
The DES cipher uses the same concept
as the Caesar cipher, but the
encryption/decryption algorithm is
much more complex due to the sixteen
48
-
bit keys derived from a 56
-
bit key.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
ECB mode
Electronic Code Book Mode
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
CBC mode
Cipher Block Chaining Mode
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
CFM
Cipher Feedback Mode
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
CSM
Stream Cipher Mode
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Cryptanalysis
Some common symmetric
-
key
cryptographic algorithms.
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Public
-
Key Cryptography
RSA
Choosing Public and Private Keys
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Public
-
key cryptography
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
Public
-
key algorithms are more
efficient for short messages.
Note
:
McGraw
-
Hill
©
The McGraw
-
Hill Companies, Inc., 2004
RSA
Public Key 5 , 119 Private Key 77 , 199
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Σχόλια 0
Συνδεθείτε για να κοινοποιήσετε σχόλιο