Cryptography

1 / 8

Cryptography - PowerPoint PPT Presentation

Cryptography. in network security. Kayla Henneman CS 555. Goal: Secure Communication Confidentiality Authentication Access Control Non-Repudiation. Why we need cryptography. Encryption Decryption Algorithm Key Symmetric Asymmetric. What is Cryptography. Algorithms:.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

PowerPoint Slideshow about 'Cryptography' - cormac

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Cryptography

in network security

Kayla Henneman

CS 555

Goal: Secure Communication

• Confidentiality
• Authentication
• Access Control
• Non-Repudiation
Why we need cryptography

Encryption

• Decryption
• Algorithm
• Key
• Symmetric
• Asymmetric
What is Cryptography
Algorithms:

http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg

Substitution

• Transposition
• Combinational

Techniques for cryptography

http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg

Secure Socket Layer/Transport Layer Security

• Provides communication security between the transport layers of two hosts
• Provides a secure tunnel between two hosts
• Widely used to secure web shopping
Example: SSL/TLS
SSL/TLS Handshake

http://minnie.tuhs.org/NetSec/Slides/week7.html

http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpghttp://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg

• http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg
• http://minnie.tuhs.org/NetSec/Slides/week7.html