+ All Categories
Home > Documents > Security

Security

Date post: 30-Dec-2015
Category:
Upload: ulric-perez
View: 15 times
Download: 0 times
Share this document with a friend
Description:
PART VII. Security. Security Topics. Chapters. Chapter 29 Cryptography. Chapter 30 Message Authentication, User Authentication, and Key Management. Chapter 31 Security Protocols in The Internet. Chapter 29. Cryptography. 29.1 Introduction. - PowerPoint PPT Presentation
31
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 Security Security PART PART VII VII
Transcript

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

SecuritySecurity

PART PART VIIVII

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Security Topics

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Chapters

Chapter 29 Cryptography

Chapter 30 Message Authentication, User Authentication, and Key Management

Chapter 31 Security Protocols in The Internet

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Chapter 29

Cryptography

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.1 Introduction29.1 Introduction

Introduction Introduction to to

CryptographyCryptography

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.1 Cryptography components

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.2 Encryption and decryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In cryptography, the encryption/decryption algorithms

are public; the keys are secret.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.2 Symmetric-Key Cryptography29.2 Symmetric-Key Cryptography

Traditional Cipher

Block Cipher

Operation Modes

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.3 Symmetric-key cryptography

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In symmetric-key cryptography, the same key is used in both directions.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Symmetric-key cryptography is often used for long messages.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.4 Caesar cipher

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.5 Example of monoalphabetic substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In monoalphabetic substitution, the relationship between a character in the

plaintext to the character in the ciphertext is always one-to-one.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.6 Vigenere cipher

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In polyalphabetic substitution, the relationship between a character in the

plaintext and a character in the ciphertext is one-to-many.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.7 Transpositional cipher

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.8 Block cipher

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.9 P-box

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.10 S-box

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.11 Product block

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.12 DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.13 General scheme of DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.14 Iteration block

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.15 Triple DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.3 Public-Key Cryptography29.3 Public-Key Cryptography

RSA

Choosing Public and Private Keys

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.20 Public-key cryptography

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Public-key algorithms are more efficient for short messages.

NoteNote::

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.21 RSA


Recommended