FALLSEM2017-18_CIS5701_ETH_SJT322_VL2017181005807_Reference Material I.pdf

FALLSEM2017-18_CIS5701_ETH_SJT322_VL2017181005807_Reference Material I.pdf

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Dr.V.MadhuViswanatham Reference materials ONLY 8/7/2017 Cryptography 1 Cryptography and Network Security
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
-Introduction -Symmetric key cryptography - 8/7/2017 Cryptography 2 Overview
Image of page 2
Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Cryptography -The art/science encompassing the principles and methods of transforming an intelligible message into unintelligible message and then retransforming that message back to its original form Cryptanalysis - the study of principles and methods of transforming an unintelligible message into an intelligible message with out knowledge of the key. Cryptology – Both cryptography and cryptana lysis 8/7/2017 Cryptography 3 Terminology
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Dictionary.com says: 1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as: . A group or department of private guards: Call building security if a visitor acts suspicious. 8/7/2017 Cryptography 4 What is “Security”
Image of page 4
Attacks can be occurred on network: - Disclosure - Traffic analysis - Snooping - Masquerading - Modification - Repudiation - Replaying 8/7/2017 Cryptography 5 Why do we need Network security?
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
- Confidentiality - Integrity - Availability 8/7/2017 Cryptography 6 Security Goals
Image of page 6
Classification of Security Attacks - Passive Attacks Active Attacks Attacks Passive/Active Threatening Snooping Traffic Analysis Passive Confidentiality Modification Masquerading Replaying Repudiation Active Integrity Denial of Service Active Availability 8/7/2017 7 VIT University
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Data Confidentiality- protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Authentication - assurance that the communicating entity is the one claimed
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern