tailieunhanh - Lecture TCP-IP protocol suite (3/e): Chapter 28 - Behrouz Forouzan

Chapter 28 - Security. In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security. | Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand four aspects of security Understand the concept of digital signature Understand the role of key management in entity authentication Know how and where IPSec, TLS, and PPG provide security Objectives TCP/IP Protocol Suite CRYPTOGRAPHY The word cryptography in Greek means “secret writing.” The term today refers to the science and art of transforming messages to make them secure and immune to attacks. The topics discussed in this section include: Symmetric-Key Cryptography Asymmetric-Key Cryptography Comparison TCP/IP Protocol Suite Figure Cryptography components TCP/IP Protocol Suite In cryptography, the encryption/decryption algorithms are public; the keys are secret. Note: TCP/IP Protocol Suite In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. . | Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand four aspects of security Understand the concept of digital signature Understand the role of key management in entity authentication Know how and where IPSec, TLS, and PPG provide security Objectives TCP/IP Protocol Suite CRYPTOGRAPHY The word cryptography in Greek means “secret writing.” The term today refers to the science and art of transforming messages to make them secure and immune to attacks. The topics discussed in this section include: Symmetric-Key Cryptography Asymmetric-Key Cryptography Comparison TCP/IP Protocol Suite Figure Cryptography components TCP/IP Protocol Suite In cryptography, the encryption/decryption algorithms are public; the keys are secret. Note: TCP/IP Protocol Suite In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note: TCP/IP Protocol Suite Figure Symmetric-key cryptography TCP/IP Protocol Suite In symmetric-key cryptography, the same key is used in both directions. Note: TCP/IP Protocol Suite Figure Caesar cipher TCP/IP Protocol Suite Figure Transpositional cipher TCP/IP Protocol Suite Figure DES TCP/IP Protocol Suite Figure Iteration block TCP/IP Protocol Suite Figure Triple DES TCP/IP Protocol Suite The DES cipher uses the same concept as the Caesar cipher, but the encryption/ decryption algorithm is much more complex. Note: TCP/IP Protocol Suite Figure Public-key cryptography TCP/IP Protocol Suite Figure RSA TCP/IP Protocol Suite Symmetric-key cryptography is often used for long messages. Note: TCP/IP Protocol Suite Asymmetric-key algorithms are more efficient for short messages. Note: TCP/IP Protocol Suite PRIVACY Privacy means that the sender and the receiver expect confidentiality. The .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.