Date post: | 24-Dec-2014 |
Category: |
Technology |
Upload: | idris-usmani |
View: | 129 times |
Download: | 3 times |
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 27
NetworkSecurity
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-1
Aspects of security
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-2
Secret key encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-3
Public key encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-4
Combination
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-5
Signing the whole document
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-6Signing the digest
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-7
Sender site
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-8Receiver site
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-9
PGP at the sender site
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-10
PGP at the receiver site
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 25-11
Access authorization with secret key encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 25-12
Access authorization with public key encryption