Ch08 - Scrambling Through Cryptography

Ch08 - Scrambling Through Cryptography - S...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals  Second Edition Chapter 8:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Define cryptography Secure with cryptography hashing algorithms Protect with symmetric encryption algorithms Harden with asymmetric encryption algorithms Explain how to use cryptography
Background image of page 2
3 Cryptography Terminology Cryptography: science of transforming information so it is  secure while being transmitted or stored Steganography: attempts to hide existence of data Encryption: changing the original text to a secret message  using cryptography Decryption: reverse process of encryption Algorithm: process of encrypting and decrypting information  based on a mathematical procedure Key: value used by an algorithm to encrypt or decrypt a  message
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Cryptography Terminology (continued) Weak key: mathematical key that creates a detectable pattern  or structure Plaintext: original unencrypted information (also known as  clear text) Cipher: encryption or decryption algorithm tool used to create  encrypted or decrypted text Ciphertext: data that has been encrypted by an encryption  algorithm
Background image of page 4
5 Cryptography Terminology (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 How Cryptography Protects Intended to protect the confidentiality of information Second function of cryptography is authentication Should ensure the integrity of the information as well Should also be able to enforce nonrepudiation, the inability to  deny that actions were performed Can be used for access control
Background image of page 6
7 Securing with Cryptography Hashing  Algorithms One of the three categories of cryptographic algorithms is  known as hashing
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Defining Hashing Hashing, also called a one-way hash, creates a ciphertext from  plaintext Cryptographic hashing follows this same basic approach Hash algorithms verify the accuracy of a value without  transmitting the value itself and subjecting it to attacks A practical use of a hash algorithm is with automatic teller  machine (ATM) cards
Background image of page 8
9 Defining Hashing (continued)
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Defining Hashing (continued) Hashing is typically used in two ways: To determine whether a password a user enters is correct  without transmitting the password itself To determine the integrity of a message or contents of a file Hash algorithms are considered very secure if the hash that is  produced has the characteristics listed on pages 276 and 277 of  the text
Background image of page 10
11 Defining Hashing (continued)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Message Digest (MD) Message digest 2 (MD2) takes plaintext of any length and  creates a hash 128 bits long  MD2 divides the message into 128-bit sections If the message is less than 128 bits, data known as padding 
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course NETWORK SE Security + taught by Professor None during the Three '10 term at University of Sydney.

Page1 / 42

Ch08 - Scrambling Through Cryptography - S...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online