ICT211_StudyUnit1 - ICT211 Encryption Techniques And System...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT211 Encryption Techniques And System Security STUDY UNIT 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
ICT211 STUDY NOTES STUDY UNIT 1 SIM UNIVERSITY SU1-1 SUMMARY OF UNIT 1 This is the first Unit for the course Encryption Techniques and System Security . There are altogether two chapters. Chapter 1 is an introduction to the topics. It provides an overview of the general concepts and terminology. Detailed discussions for each area of interest will commence from Chapter 2, Symmetric Encryption & Message Confidentiality. The focus of Chapter 2 is on a class of conventional security algorithms, known as symmetric algorithms . We will also discuss how one could provide confidentiality protection of messages. The important issues related to Key Management will be highlighted as well. STUDY GUIDE FOR UNIT 1 Chapter 1 Introduction This short chapter is the introduction to the unit. The students need to be familiar with different security attacks, security services and mechanisms. The more important material is in Page 2 -22. Chapter 2 Symmetric Encryption & Message Confidentiality The main topics to be discussed in this chapter include - the role played by encryption algorithms, - the difference between symmetric algorithms and asymmetric algorithms, - a survey on the more well-known symmetric algorithms and their pros and cons, - the key management and encryption device management. These topics roughly cover Page 35 – 55. . The details of AES (Page 39 – 42) will be briefly highlighted but will not be examined. Similarly, students are required to be aware of the existence of different cipher modes of operation (Page 46 – 51), but not required to remember the details.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 1 ICT211 STUDY NOTES SU1-2 SIM UNIVERSITY The students from this course may come from diverse background, with different experiences and exposure. Thus it may be difficult to accurately state the time needed for each topics/chapters for this module. The following table gives some estimates that could hopefully serve as a guide: Topics Estimated Study Time Chapter 1 1.1 Introduction 2 hours 1.2 A Common Framework 2 hours 1.3 Security Attacks 2 hours 1.4 Security Services and Mechanisms 3 hours Chapter 2 2.1 Introduction Some Simple Ways to Protect Message Confidentiality 1 hours 2.2 Encryption & Decryption 1.5 hours 2.3 Important Requirements & Observations 1.5 hours 2.4 Different Types of Algorithms 4 hours 2.5 Cryptanalysis 3 hours 2.6 Well Known Encryption Algorithms 3 hours 2.7 Location of Encryption Devices 2 hours 2.8 Key Distribution 4 hours
Background image of page 4
ICT211 STUDY NOTES STUDY UNIT 1 SIM UNIVERSITY SU1-3 CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION This course is about Encryption Techniques and System security . With the many well- known incidences concerning viruses, worms, and hackers, etc, published in the media, the importance of this topic need not be further emphasized. Security is indeed one of the important issues for businesses, individuals, and society at large. In particular, as most organizations are linked both internally and externally in
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICt211 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 34

ICT211_StudyUnit1 - ICT211 Encryption Techniques And System...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online