ICT211_StudyUnit2 - ICT211 Encryption Techniques And System...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT211 Encryption Techniques And System Security STUDY UNIT 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
ICT211 STUDY NOTES STUDY UNIT 2 SIM UNIVERSITY SU2-1 SUMMARY OF UNIT 2 This is the second Unit for the course Encryption Techniques and System Security . There are altogether two chapters: Chapter 3 and Chapter 9. Chapter 3 studies Public Key Cryptography and Message Authentication . This is an interesting chapter that discusses the more recent ideas in the security algorithms. We will see how authenticity of messages could be provided. Chapter 9 concerns Intruders. It examines a variety of information access and service threats presented by hackers that exploit vulnerabilities in network-based computing systems. STUDY GUIDE FOR UNIT 2 Chapter 3 Public Key Cryptography and Message Authentication The main topics covered in this chapter include: - the needs and different approaches to message authentication - the role played by secured hash functions - a survey on the more well-known hash functions and their pros and cons - the concept of public key algorithms - the concept of digital signature and the public-key-based key management Again, details of the various algorithms (Page 67 – 70, 71 – 73, 78 – 82) may be briefly discussed in class but the students need not remember the details. Chapter 9 Intruders This chapter discusses one of the most well-publicized security area: network intrusion. This is related to the more romanticized idea of system hacking . We will not be going into the area though. The chapter begins with a discussion of the types of attacks that can be made by unauthorized users, and analyzes various approaches to prevention and detection. This chapter also covers the related issues of password management. The important material is covered in Page 301, Page 304 – 312, and Page 316 – 321 of the reference text.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 2 ICT211 STUDY NOTES SU2-2 SIM UNIVERSITY The students from this course may come from diverse background, with different experiences and exposure. Thus it may be difficult to accurately state the time needed for each topics/chapters for this module. The following table gives some estimates that could hopefully serve as a guide: Topics Estimated Study Time Chapter 3 3.1 Introduction – what is Message Authentication 1 hours 3.2 Approaches to Message Authentication 4 hours 3.3 Secure Hash Functions and HMAC 3 hours 3.4 Public-Key Cryptography Principles 4 hours 3.5 Public-Key Cryptography Algorithms 2 hours 3.6 Digital Signatures and Message Authentication 2 hours 3.7 Key Management 4 hours Chapter 9 9.1 Intruders 3 hours 9.2 Intrusion Detection 6 hours 9.3 Password Management 6 hours
Background image of page 4
ICT211 STUDY NOTES STUDY UNIT 2 SIM UNIVERSITY SU2-3 CHAPTER 3 PUBLIC KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION 3.1 INTRODUCTION – WHAT IS MESSAGE AUTHENTICATION? In the last chapter we discuss confidentiality of a message.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICt211 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 41

ICT211_StudyUnit2 - ICT211 Encryption Techniques And System...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online