tailieunhanh - Lecture Data security and encryption - Lecture 31: Review 1-15
The contents of this chapter include all of the following: Symmetric ciphers, asymmetric ciphers, cryptographic data integrity algorithms, mutual trust, network security and internet security, system security, legal and ethical issues. | Data Security and Encryption (CSE348) 1 1 Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Revision Lectures 1-15 2 2 Course Outline Part One: Symmetric Ciphers: Provides a survey of symmetric encryption, including classical and modern algorithms. The emphasis is on the two most important algorithms, the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES).This part also covers the most important stream encryption algorithm,RC4,and the important topic of pseudorandom number generation. 3 3 Course Outline Part Two: Asymmetric Ciphers: Provides a survey of public-key algorithms, including RSA (Rivest-Shamir-Adelman) and elliptic curve. 4 4 Course Outline Part Three: Cryptographic Data Integrity Algorithms: Begins with a survey of cryptographic hash functions. This part then covers two approaches to data integrity that rely on cryptographic hash functions: message authentication codes and digital signatures. 5 5 Course Outline Part Four: Mutual Trust: Covers key management and key distribution topics and then covers user authentication techniques. 6 6 Course Outline Part Five: Network Security and Internet Security: Examines the use of cryptographic algorithms and security protocols to provide security over networks and the Internet. Topics covered include transport-level security, wireless network security, e-mail security, and IP security. 7 7 Course Outline Part Six: System Security: Deals with security facilities designed to protect a computer system from security threats, including intruders, viruses, and worms. This part also looks at firewall technology. 8 8 Course Outline Part Seven: Legal and Ethical Issues: Deals with the legal and ethical issues related to computer and network security. 9 9 Computer Security Protection afforded to an automated information system in order to . | Data Security and Encryption (CSE348) 1 1 Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Revision Lectures 1-15 2 2 Course Outline Part One: Symmetric Ciphers: Provides a survey of symmetric encryption, including classical and modern algorithms. The emphasis is on the two most important algorithms, the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES).This part also covers the most important stream encryption algorithm,RC4,and the important topic of pseudorandom number generation. 3 3 Course Outline Part Two: Asymmetric Ciphers: Provides a survey of public-key algorithms, including RSA (Rivest-Shamir-Adelman) and elliptic curve. 4 4 Course Outline Part Three: Cryptographic Data Integrity Algorithms: Begins with a survey of cryptographic hash functions. This part then covers two approaches to data .
đang nạp các trang xem trước