Well established needs for secure communication


Download 42 Kb.
bet1/13
Sana02.06.2024
Hajmi42 Kb.
#1840276
  1   2   3   4   5   6   7   8   9   ...   13
Bog'liq
9-crypt

Computer Security

  • Communications, Networking & Security
  • Cryptography

Well established needs for secure communication

  • Well established needs for secure communication
    • War time communication
    • Business transactions
    • Illicit Love Affairs
  • Requirements of secure communication
  • Secure Communication Needs and Requirements

Cryptography is the science of secret, or hidden writing

  • Cryptography is the science of secret, or hidden writing
  • It has two main Components:
    • Encryption
    • Authentication & Integrity
      • Ensuring that users of data/resources are the persons they claim to be and that a message has not been surreptitiously altered
  • Cryptography Basics

Cipher is a method for encrypting messages

  • Cipher is a method for encrypting messages
  • Encryption algorithms are standardized & published
  • The key which is an input to the algorithm is secret
    • Key is a string of numbers or characters
    • If same key is used for encryption & decryption the algorithm is called symmetric
    • If different keys are used for encryption & decryption the algorithm is called asymmetric
  • Encryption Cipher
  • Plain Text
  • Encryption
  • Algorithm
  • Key A
  • Key B
  • Cipher Text
  • Plain Text
  • Decryption
  • Algorithm

Download 42 Kb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9   ...   13




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling