Download
Network Security Presentation Transcript:
1.Network Security
2.Cryptography
Introduction to Cryptography
Substitution Ciphers
Transposition Ciphers
One-Time Pads
Two Fundamental Cryptographic Principles
3.Need for Security
4.An Introduction to Cryptography
5.One-Time Pads
The use of a one-time pad for encryption and the possibility of getting any possible plaintext from the ciphertext by the use of some other pad.
6.Symmetric-Key Algorithms
DES – The Data Encryption Standard
AES – The Advanced Encryption Standard
Cipher Modes
Other Ciphers
Cryptanalysis
7.AES – The Advanced Encryption Standard
Rules for AES proposals
The algorithm must be a symmetric block cipher.
The full design must be public.
Key lengths of 128, 192, and 256 bits supported.
Both software and hardware implementations required
The algorithm must be public or licensed on nondiscriminatory terms.
8.Electronic Code Book Mode
9.Cipher Feedback Mode
10.Public-Key Algorithms
RSA
Other Public-Key Algorithms
11.Digital Signatures
Symmetric-Key Signatures
Public-Key Signatures
Message Digests
The Birthday Attack
12.Symmetric-Key Signatures
13.Management of Public Keys
Certificates
X.509
Public Key Infrastructures
14.Problems with Public-Key Encryption
15.Communication Security
IPsec
Firewalls
Virtual Private Networks
Wireless Security
No comments:
Post a Comment