tailieunhanh - Lecture Network security: Chapter 11 - Dr. Munam Ali Shah

The topic discussed in this chapter are cryptography as a network security tool. In this chapter we will talk about 3-Dimesions of cryptography; cryptanalysis and brute force attacks; classical ciphers: substitution cipher, transposition cipher. | Network Security Lecture 11 Presented by Dr. Munam Ali Shah Part 2 b Cryptography as a Network Security Tool Sum mary of the previous lecture We had overviewed what cryptography is and how can we use this tool to incorporate security We discussed different terminologies such as Alice Bob Eve Key cryptanalysis steganography etc. We also reviewed how encryption and decryption using keys work. 4 types of .

TÀI LIỆU LIÊN QUAN