1 / 5

Cryptography Introduction

Cryptography Introduction. Prof. Ravi Sandhu. CRYPTOGRAPHIC TECHNOLOGY. SECRET KEY Symmetric Key Single Key Conventional. PUBLIC KEY Asymmetric Key Two Key. CRYPTOGRAPHIC TECHNOLOGY. Secret-key encryption Public-key encryption Public-key digital signatures Public-key key agreement

etenia
Download Presentation

Cryptography Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography Introduction Prof. Ravi Sandhu

  2. CRYPTOGRAPHIC TECHNOLOGY SECRET KEY Symmetric Key Single Key Conventional PUBLIC KEY Asymmetric Key Two Key

  3. CRYPTOGRAPHIC TECHNOLOGY • Secret-key encryption • Public-key encryption • Public-key digital signatures • Public-key key agreement • Message digests • Message authentication codes • Challenge-response authentication • Public-key certificates

  4. CRYPTOGRAPHICSERVICES • confidentiality • traffic flow confidentiality • integrity • authentication • non-repudiation

  5. SAFE CRYPTOGRAPHY • Secret-key encryption • 128 bit or higher • Public-key • 1024 bit or higher • Message digests • 160 bit or higher • These numbers keep increasing

More Related