tailieunhanh - Security in Information Systems: Chapter 4 - Cryptography & Key Exchange Protocols

Security in Information Systems: Chapter 4 - Cryptography & Key Exchange Protocols includes CryptographyCryptography -related conceptsrelated concepts, Key channel for symmetric cryptosystems, Perfect encryption, Dolev-Yao threat model, Protocol “message authentication”, Protocol “challenge-response”, Public-key cryptosystems. | Cryptography Key Exchange PrOtocols Faculty of Computer Science Engineering HCMC University of Technology Outline Cryptography-related concepts CZ Key channel for symmetric cryptosystems CZ Perfect encryption Dolev-Yao threat model CZ Protocol message authentication Protocol challenge-response Public-key cryptosystems Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering 2011 Information Systems Security Chapter 2 Cryptography Key Exchange Protocols 2 Cryptography-related concepts Plaintext is the original content which is readable as textual material. Plaintext needs protecting. Ciphertext is the result of encryption performed on plaintext using an algorithm. Ciphertext is not readable. Encryption is the process of turning plaintext into ciphertext decryption is the inverse of the encryption. Encryption decryption process needs keys Cryptosystems encryption decryption algorithms Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering 2011 Information Systems Security Chapter 2 Cryptography Key Exchange Protocols