cryptography n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Cryptography PowerPoint Presentation
Download Presentation
Cryptography

Loading in 2 Seconds...

play fullscreen
1 / 8

Cryptography - PowerPoint PPT Presentation


  • 126 Views
  • Uploaded on

Cryptography. in network security. Kayla Henneman CS 555. Goal: Secure Communication Confidentiality Authentication Access Control Non-Repudiation. Why we need cryptography. Encryption Decryption Algorithm Key Symmetric Asymmetric. What is Cryptography. Algorithms:.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Cryptography' - cormac


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
cryptography

Cryptography

in network security

Kayla Henneman

CS 555

why we need cryptography

Goal: Secure Communication

    • Confidentiality
    • Authentication
    • Access Control
    • Non-Repudiation
Why we need cryptography
what is cryptography

Encryption

  • Decryption
  • Algorithm
  • Key
    • Symmetric
    • Asymmetric
What is Cryptography
algorithms
Algorithms:

http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg

techniques for cryptography

Substitution

  • Transposition
  • Combinational

http://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png

Techniques for cryptography

http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg

example ssl tls

Secure Socket Layer/Transport Layer Security

  • Provides communication security between the transport layers of two hosts
  • Provides a secure tunnel between two hosts
  • Widely used to secure web shopping
Example: SSL/TLS
ssl tls handshake
SSL/TLS Handshake

http://minnie.tuhs.org/NetSec/Slides/week7.html

references

http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpghttp://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg

  • http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg
  • http://minnie.tuhs.org/NetSec/Slides/week7.html
  • http://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png
References: