Suche senden
Hochladen
9780840024220 ppt ch03
•
Als PPTX, PDF herunterladen
•
1 gefällt mir
•
820 views
K
Kristin Harrison
Folgen
Chapter 03
Weniger lesen
Mehr lesen
Bildung
Melden
Teilen
Melden
Teilen
1 von 53
Jetzt herunterladen
Empfohlen
5 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
Â
Cryptography in Python
Cryptography in Python
Amirali Sanatinia
Â
RSA Algoritmn
RSA Algoritmn
Dr. Kapil Gupta
Â
Cryptography basices
Cryptography basices
Siddique Ibrahim
Â
Cryptography using python
Cryptography using python
KaushikRamabhotla
Â
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Â
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Â
Cryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
Â
Empfohlen
5 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
Â
Cryptography in Python
Cryptography in Python
Amirali Sanatinia
Â
RSA Algoritmn
RSA Algoritmn
Dr. Kapil Gupta
Â
Cryptography basices
Cryptography basices
Siddique Ibrahim
Â
Cryptography using python
Cryptography using python
KaushikRamabhotla
Â
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Â
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Â
Cryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
Â
Cryptography Intro
Cryptography Intro
Christopher Martin
Â
Cryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
Â
Network security and cryptography
Network security and cryptography
Pavithra renu
Â
Cryptography.ppt
Cryptography.ppt
kusum sharma
Â
Cryptography
Cryptography
herrberk
Â
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Â
Cryptography and network security
Cryptography and network security
Mathan Gopal
Â
Cryptography
Cryptography
ŘŁŘلام انصارى
Â
Cryptography and network security
Cryptography and network security
Mahipesh Satija
Â
Cryptography
Cryptography
okolo chukwudumebi prince
Â
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
Â
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
Â
Introduction to cryptography part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
Â
Network Security
Network Security
Federal Urdu University
Â
Basic cryptography
Basic cryptography
Perfect Training Center
Â
Encryption
Encryption
Syed Taimoor Hussain Shah
Â
Symmetric Key Algorithm
Symmetric Key Algorithm
SHUBHA CHATURVEDI
Â
Network security
Network security
ABHISHEK KUMAR
Â
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Â
Cryptography
Cryptography
Suraj Shukla
Â
Semantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web Technology
Rinke Hoekstra
Â
Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008
Philip Sheldrake
Â
Weitere ähnliche Inhalte
Was ist angesagt?
Cryptography Intro
Cryptography Intro
Christopher Martin
Â
Cryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
Â
Network security and cryptography
Network security and cryptography
Pavithra renu
Â
Cryptography.ppt
Cryptography.ppt
kusum sharma
Â
Cryptography
Cryptography
herrberk
Â
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Â
Cryptography and network security
Cryptography and network security
Mathan Gopal
Â
Cryptography
Cryptography
ŘŁŘلام انصارى
Â
Cryptography and network security
Cryptography and network security
Mahipesh Satija
Â
Cryptography
Cryptography
okolo chukwudumebi prince
Â
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
Â
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
Â
Introduction to cryptography part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
Â
Network Security
Network Security
Federal Urdu University
Â
Basic cryptography
Basic cryptography
Perfect Training Center
Â
Encryption
Encryption
Syed Taimoor Hussain Shah
Â
Symmetric Key Algorithm
Symmetric Key Algorithm
SHUBHA CHATURVEDI
Â
Network security
Network security
ABHISHEK KUMAR
Â
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Â
Cryptography
Cryptography
Suraj Shukla
Â
Was ist angesagt?
(20)
Cryptography Intro
Cryptography Intro
Â
Cryptography and Network Security
Cryptography and Network Security
Â
Network security and cryptography
Network security and cryptography
Â
Cryptography.ppt
Cryptography.ppt
Â
Cryptography
Cryptography
Â
Network security & cryptography full notes
Network security & cryptography full notes
Â
Cryptography and network security
Cryptography and network security
Â
Cryptography
Cryptography
Â
Cryptography and network security
Cryptography and network security
Â
Cryptography
Cryptography
Â
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Â
Information Security & Cryptography
Information Security & Cryptography
Â
Introduction to cryptography part1-final
Introduction to cryptography part1-final
Â
Network Security
Network Security
Â
Basic cryptography
Basic cryptography
Â
Encryption
Encryption
Â
Symmetric Key Algorithm
Symmetric Key Algorithm
Â
Network security
Network security
Â
Introduction to Cryptography
Introduction to Cryptography
Â
Cryptography
Cryptography
Â
Andere mochten auch
Semantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web Technology
Rinke Hoekstra
Â
Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008
Philip Sheldrake
Â
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Richard Wallis
Â
Ch04 records management
Ch04 records management
xtin101
Â
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Â
PowerPoint 2013 ch07
PowerPoint 2013 ch07
Kristin Harrison
Â
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communities
kfritschie
Â
PowerPoint 2013 ch04
PowerPoint 2013 ch04
Kristin Harrison
Â
The Essential Elements of CJR
The Essential Elements of CJR
BESLER
Â
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Farhan Ali
Â
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
BESLER
Â
Simkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobile
Haqem BESTMobile
Â
Ahtosalo_sivulaudatur
Ahtosalo_sivulaudatur
Milja Ahtosalo
Â
The Essential Elements of CJR
The Essential Elements of CJR
BESLER
Â
Simkad BestMobile Malaysia
Simkad BestMobile Malaysia
Haqem BESTMobile
Â
Uncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-ons
BESLER
Â
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
BESLER
Â
Vatly2013dantri
Vatly2013dantri
nguyencongtuan
Â
Chapter 01
Chapter 01
Kristin Harrison
Â
Rauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumado
RauliPatagonia
Â
Andere mochten auch
(20)
Semantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web Technology
Â
Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008
Â
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Â
Ch04 records management
Ch04 records management
Â
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Â
PowerPoint 2013 ch07
PowerPoint 2013 ch07
Â
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communities
Â
PowerPoint 2013 ch04
PowerPoint 2013 ch04
Â
The Essential Elements of CJR
The Essential Elements of CJR
Â
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Â
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
Â
Simkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobile
Â
Ahtosalo_sivulaudatur
Ahtosalo_sivulaudatur
Â
The Essential Elements of CJR
The Essential Elements of CJR
Â
Simkad BestMobile Malaysia
Simkad BestMobile Malaysia
Â
Uncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-ons
Â
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
Â
Vatly2013dantri
Vatly2013dantri
Â
Chapter 01
Chapter 01
Â
Rauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumado
Â
Ă„hnlich wie 9780840024220 ppt ch03
groupWork.pptx
groupWork.pptx
KennedyKiplangat1
Â
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
Â
chapter 1-4.pdf
chapter 1-4.pdf
zerihunnana
Â
information technology cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
Â
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
Vaibhav Khanna
Â
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
Â
Basic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
Â
Encrytion ppt
Encrytion ppt
Raj Sampat
Â
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
mustafaenayat
Â
Cryptography.pptx
Cryptography.pptx
AnmolBansal66
Â
symmetric cipher model.pptx
symmetric cipher model.pptx
Ajaykumar967485
Â
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
Â
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
pooleavelina
Â
Security
Security
Sri Manakula Vinayagar Engineering College
Â
Network Security Topic 3 cryptography
Network Security Topic 3 cryptography
Khawar Nehal khawar.nehal@atrc.net.pk
Â
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
Â
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
Â
Cryptography
Cryptography
Muhammad Shoaib Saleem
Â
Security fundamentals
Security fundamentals
SofoklisEfremidisAIT
Â
Security Fundamentals
Security Fundamentals
SecureIoT H2020 funded project
Â
Ă„hnlich wie 9780840024220 ppt ch03
(20)
groupWork.pptx
groupWork.pptx
Â
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
Â
chapter 1-4.pdf
chapter 1-4.pdf
Â
information technology cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Â
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
Â
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
Â
Basic Cryptography.pdf
Basic Cryptography.pdf
Â
Encrytion ppt
Encrytion ppt
Â
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
Â
Cryptography.pptx
Cryptography.pptx
Â
symmetric cipher model.pptx
symmetric cipher model.pptx
Â
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Â
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
Â
Security
Security
Â
Network Security Topic 3 cryptography
Network Security Topic 3 cryptography
Â
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Â
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
Â
Cryptography
Cryptography
Â
Security fundamentals
Security fundamentals
Â
Security Fundamentals
Security Fundamentals
Â
Mehr von Kristin Harrison
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
Kristin Harrison
Â
rm, 10e ch02 copy
rm, 10e ch02 copy
Kristin Harrison
Â
9780840024220 ppt ch12
9780840024220 ppt ch12
Kristin Harrison
Â
9780840024220 ppt ch11
9780840024220 ppt ch11
Kristin Harrison
Â
9780840024220 ppt ch10
9780840024220 ppt ch10
Kristin Harrison
Â
9780840024220 ppt ch09
9780840024220 ppt ch09
Kristin Harrison
Â
9780840024220 ppt ch08
9780840024220 ppt ch08
Kristin Harrison
Â
9780840024220 ppt ch05
9780840024220 ppt ch05
Kristin Harrison
Â
9780840024220 ppt ch04
9780840024220 ppt ch04
Kristin Harrison
Â
9780840024220 ppt ch02
9780840024220 ppt ch02
Kristin Harrison
Â
9780840024220 ppt ch07
9780840024220 ppt ch07
Kristin Harrison
Â
9780840024220 ppt ch06
9780840024220 ppt ch06
Kristin Harrison
Â
9780840024220 ppt ch01
9780840024220 ppt ch01
Kristin Harrison
Â
Chapter 14
Chapter 14
Kristin Harrison
Â
Chapter 13
Chapter 13
Kristin Harrison
Â
Chapter 12
Chapter 12
Kristin Harrison
Â
Chapter 11
Chapter 11
Kristin Harrison
Â
Chapter 10
Chapter 10
Kristin Harrison
Â
Chapter 09
Chapter 09
Kristin Harrison
Â
Chapter 08
Chapter 08
Kristin Harrison
Â
Mehr von Kristin Harrison
(20)
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
Â
rm, 10e ch02 copy
rm, 10e ch02 copy
Â
9780840024220 ppt ch12
9780840024220 ppt ch12
Â
9780840024220 ppt ch11
9780840024220 ppt ch11
Â
9780840024220 ppt ch10
9780840024220 ppt ch10
Â
9780840024220 ppt ch09
9780840024220 ppt ch09
Â
9780840024220 ppt ch08
9780840024220 ppt ch08
Â
9780840024220 ppt ch05
9780840024220 ppt ch05
Â
9780840024220 ppt ch04
9780840024220 ppt ch04
Â
9780840024220 ppt ch02
9780840024220 ppt ch02
Â
9780840024220 ppt ch07
9780840024220 ppt ch07
Â
9780840024220 ppt ch06
9780840024220 ppt ch06
Â
9780840024220 ppt ch01
9780840024220 ppt ch01
Â
Chapter 14
Chapter 14
Â
Chapter 13
Chapter 13
Â
Chapter 12
Chapter 12
Â
Chapter 11
Chapter 11
Â
Chapter 10
Chapter 10
Â
Chapter 09
Chapter 09
Â
Chapter 08
Chapter 08
Â
KĂĽrzlich hochgeladen
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
YousafMalik24
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
SamikshaHamane
Â
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
Â
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Humphrey A Beña
Â
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
MIPLM
Â
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Mr Bounab Samir
Â
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
Â
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Celine George
Â
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
navabharathschool99
Â
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
SpandanaRallapalli
Â
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
Celine George
Â
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
iammrhaywood
Â
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
phamnguyenenglishnb
Â
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Celine George
Â
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
Â
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Â
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Carlos105
Â
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Â
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
Â
KĂĽrzlich hochgeladen
(20)
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Â
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Â
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Â
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Â
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Â
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Â
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Â
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Â
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
Â
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Â
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
Â
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Â
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
Â
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Â
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Â
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
Â
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Â
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Â
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Â
9780840024220 ppt ch03
1.
Guide to Network
Security First Edition Chapter Three Cryptography
2.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Objectives • Chronicle the most significant events and discoveries in the history of cryptology • Explain the basic principles of cryptography • Describe the operating principles of the most popular cryptographic tools • List and explain the major protocols used for secure communications • Discuss the nature and execution of attacks used against cryptosystems 2
3.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Introduction • Critical aspects of cryptography – Protecting and verifying transmitted information • Cryptanalysis – Obtaining the original message from an encrypted message without knowing the keys • Encryption – Process of converting an original message into a form unreadable by unauthorized individuals • Focus of this chapter: general overview 3
4.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Terminology • Algorithm • Cipher or cryptosystem • Ciphertext or cryptogram • Code • Decipher • Encipher • Key or cryptovariable • Keyspace • Link encryption 4
5.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Terminology (cont’d.) • Nonrepudiation • Plaintext or cleartext • Steganography • Substitution • Transposition • Work factor 5
6.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. History of Cryptology • Egyptians and Mesopotamians used cryptography on clay tablets • Julius Caesar used a simple substitution cipher to secure military communications • Alberti used polyalphabetic substitution in 1466 • Thomas Jefferson created the 26-letter wheel cipher • Used in World War I for radio communications • Table 3-1 in the text gives detailed history 6
7.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Cipher Methods • Bit stream method – Each bit in plaintext transformed, one bit at a time – Commonly uses exclusive OR operation (XOR) • Block cipher method – Message divided into blocks – Each block transformed into an encrypted block – Commonly uses substitution, transposition, XOR or combination of these 7
8.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Substitution Cipher • One value substituted for another • Monoalphabetic substitution – Uses one alphabet • Polyalphabetic substitution – Uses two or more alphabets • Caesar cipher – Three position shift to the right • Vigenère cipher – See Figure 3-2 for Vigenère square 8
9.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 9 Figure 3-2 Vigenère Square © Cengage Learning 2013
10.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Transposition Cipher • Simple to understand – Can product difficult to decipher ciphertext if properly used • Rearranges values within a block to create ciphertext – Bit level or byte level • Transposition and substitution ciphers can be combined – Highly secure encryption process 10
11.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Exclusive OR Operation • Exclusive OR (XOR) – Function of a binary operation 11 Table 3-2 XOR truth table © Cengage Learning 2013
12.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Vernam Cipher • Also called one-time pad • Uses set of characters only one time for each encryption process • Pad values are added to numeric values that represent plaintext – Each character of plaintext turned into a number – A pad value for that position is added to it – Sum is converted back to a ciphertext character – All numbers must be in the range 1-26 • Example on Pages 98-99 of the text 12
13.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Book or Running Key Cipher • Text in a book used as key to decrypt a message • Recipient must know which book is used – Page and line number • Dictionaries and thesauruses commonly used • Grille cipher – Uses a stencil or template with holes cut out – Apply template to particular book or document – Message is revealed in the holes (apertures) 13
14.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Hash Functions • Mathematical algorithms • Generate a message summary or digest – Used to confirm whether message content has changed – Confirms message identity and integrity – The same message always provides the same hash value • Hash cannot be used to determine message contents • Secure Hash Standard (SHS) issued by NIST 14
15.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Hash Functions (cont’d.) • Attack methods – Rainbow cracking • Rainbow table – Database of precomputed hashes from sequentially calculated passwords • Protecting against rainbow cracking – Protect the file of hashed passwords – Limit login attempts – Hash salting 15
16.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Cryptographic Algorithms • Two broad categories – Symmetric – Asymmetric • Today’s popular cryptosystems: – Combine symmetric and asymmetric algorithms 16
17.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Cryptographic Notation • Notation varies depending on the source • Notation used in this text – M represents original message – C represents ciphertext – E represents the encryption process – D represents the decryption process – K represents the key • Example of use: E(M) = C 17
18.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption • Same secret key used to encipher and decipher the message • Also called private key encryption • Mathematical algorithms used – Processes executed quickly by computers • Primary challenge: getting the key to the receiver – Must be done “out of band” • Using a different channel other than one carrying the ciphertext 18
19.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 19 Figure 3-5 Example of symmetric encryption © Cengage Learning 2013
20.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Data Encryption Standard (DES) – Developed by IBM – Key length: 56 bits – Block size: 64 bits – Adopted as a federal standard in 1976 • Key length is insufficient to provide acceptable security – Electronic Frontier Foundation broke a DES key in 56 hours in 1998 20
21.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Triple DES (3DES) – Provides level of security far beyond DES – Uses same encryption – Repeats encryption three times – Uses three 64-bit keys – Common implementations use two or three different keys • With advances in computing power: – Algorithm became too weak to survive 21
22.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Advanced Encryption Standard (AES) – Federal Information Processing Standard (FIPS) – Specifies a cryptographic algorithm used within the US government • Not used for National Defense – Replaces both DES and 3DES – Uses the Rijndael Block Cipher • Variable block length • Key lengths of 128, 192, or 256 bits – Number of rounds varies between 9 and 13 22
23.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Asymmetric Encryption • Uses two different keys – Either key can be used to encrypt or decrypt • Commonly used with one public key and one private key – Public keys shared in reliable directories – Private keys kept secret • RSA – Popular asymmetric key cryptosystem – Developed in 1977 by Rivest, Shamir, and Adleman 23
24.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 24 Figure 3-6 Example of asymmetric encryption © Cengage Learning 2013
25.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Hybrid Cryptography Systems • Problem with asymmetric encryption – Holding a two-party conversation requires four keys • Diffie-Hellman key exchange – Exchanging private keys using public-key encryption 25
26.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 26 Figure 3-7 Example of a Diffie-Hellman key exchange © Cengage Learning 2013
27.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Encryption Key Size • Strength of the encryption algorithm corresponds to key size – Length increases number of random guesses required to break code • Details of encrypting algorithms typically published – Allows research to uncover weaknesses 27
28.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 28 Table 3-4 Encryption key power © Cengage Learning 2013
29.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Multiple Encryption Methods • Using same operation (XOR, substitution, transposition) multiple times – No additional benefit gained • Using different operations (XOR, substitution, transposition) – Dramatically scrambles plaintext 29
30.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Encrypted Communications • Software systems used to protect information confidentiality – Most are not true cryptosystems – Applications to which cryptographic protocols have been added – Internet protocols fall into this category 30
31.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing Network Communications with IPSec and SSH • IPSec – Open-source protocol – Secures communications across IP-based networks – Often used to create a secure virtual private network – Uses several different cryptosystems • Components of IPSec – IP Security protocol • Specifies information to be added to an IP packet • Specifies how to encrypt packet data 31
32.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing Network Communications with IPSec and SSH (cont’d.) • Components of IPSec (cont’d.) – Internet Key Exchange (IKE) • Uses an asymmetric-based key exchange • Secure Shell (SSH) – Protocol for secure access over an insecure medium – Latest version: SSH-2 – Commonly used to access UNIX and Linux system shells 32
33.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 33 Figure 3-9 IPSec headers © Cengage Learning 2013
34.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing Web Communications with SSL and S-HTTP • Secure Sockets Layer (SSH) – Protocol used for public-key encryption – Provides a secure channel over the Internet – Used in most popular browsers • Secure HTTP (S-HTTP) – Extended version of HTTP – Encrypts individual messages transmitted over the Internet – Session for each individual data exchange must be established 34
35.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing E-mail with S/MIME and PGP • SMTP – First commonly used Internet e-mail standard • S/MIME – Developed to replace SMTP – Handles character sets other than 7-bit ASCII • Pretty Good Privacy (PGP) – Hybrid cryptosystem – De facto standard for encryption, authentication for e-mail and file storage applications 35
36.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 36 Table 3-5 MIME message header fields © Cengage Learning 2013
37.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing E-mail with S/MIME and PGP (cont’d.) • Pretty Good Privacy (cont’d.) – Provides six services • Authentication using digital signatures • Message encryption • Compression • E-mail compatibility • Segmentation • Key management 37
38.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing Wireless Networks with WEP and WPA • Wireless LANs – Inherently insecure – Must use some form of cryptographic security control • Two protocols in wide use – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) 38
39.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Securing Wireless Networks with WEP and WPA (cont’d.) • Wired Equivalent Privacy (WEP) – Early attempt to provide security with 802.11 network protocol – Considered weak today • Wi-Fi Protected Access (WPA and WPA2) – Created to resolve issues with WEP – 128-bit key size – Uses dynamically changing keys • Created and shared by authentication server 39
40.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. 40 Table 3-8 Comparison of WEP and WPA Source: Wi-Fi Alliance © Cengage Learning 2013
41.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Next-Generation Wireless Protocols • Robust Secure Networks (RSN) – Planned replacement for Temporal Key Integrity Profile (TKIP) in WPA – Supports key lengths up to 256 bits – Not compatible with older hardware 41
42.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Cryptographic Tools • Cryptographic capabilities – Must be embodied in tools – Apply cryptology to everyday computing • Public Key Infrastructure – Integrated system of software, services, and encryption • Digital certificates – Public-key container files – Allow computer programs to validate keys • Identify key owners 42
43.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Public Key Infrastructure (PKI) • Typical PKI solution components – Certificate authority (CA) – Registration authority (RA) – Certificate directories – Management protocols – Policies and procedures • Certificate authority – Provides housekeeping activities associated with keys and certificates – Distributes certificate revocation list (CRL) 43
44.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Digital Signatures • Encrypted messages that can be mathematically proven authentic • Management of digital signatures – Built into most Web browsers – Based on Digital Signature Standard 44
45.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Digital Certificates • Electronic document or container file that holds: – Key value – Identifying information about key owner • Authenticate cryptographic key embedded in a certificate • Often issued and certified by a third party (CA) • Verification process occurs when downloading software via the Internet 45
46.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Steganography • The art of secret writing • Technically, not a form of cryptography • Another way of protecting information confidentiality in transit • Most popular modern version – Hiding information within image files 46
47.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Attacks on Cryptosystems • Brute force attacks – Hacker searches for clues in ciphertext • Frequency analysis • Known-plaintext attack • Selected-plaintext attack 47
48.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Man-in-the-Middle Attack • Attempts to intercept a public key • Attempts to insert known key structure in place of public key • Prevention strategy – Establish public key with digital signature – Attacker cannot duplicate signature 48
49.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Correlation Attacks • Collection of brute force methods • Attempt to deduce statistical relationships between unknown key and ciphertext • Advanced codebreaking methods – Differential and linear cryptanalysis 49
50.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Dictionary Attacks • Attacker encrypts every word in a dictionary – Applies same cryptosystem used by target – Looks for match between target ciphertext and list of encrypted words • Successful with small files – Files containing usernames and passwords 50
51.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Timing Attacks • Attacker eavesdrops on victim’s session • Uses statistical analysis of patterns to discern information • Can be used to gain information about encryption key – Can eliminate some algorithms and narrow search 51
52.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Defending Against Attacks • Encryption – Useful tool to protect information confidentiality – Process of hiding the true meaning of information – Inherent flaw • If you discover the key, you can read the message – Key management is important 52
53.
© 2013 Course
Technology/Cengage Learning. All Rights Reserved. Summary • Encryption is the process of converting a message to a form unreadable by unauthorized individuals • Strength of encryption systems is generally determined by the key length • Hash functions generate a message summary that can confirm message has not been altered • Digital signatures are encrypted messages verified by a third party • Attacks on information often use brute force methods 53
Jetzt herunterladen