L02-Cryptography-Overview

L02-Cryptography-Overview - Cryptography – An Overview 1...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Cryptography Cryptography An Overview An Overview
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Security Services Security Services • Confidentiality (privacy) • Authentication (who created or sent the data) • Integrity (Data are not altered/tampered) • Non-repudiation (prevents denial of previous commitments) • Access control (prevents misuse of resources) • Availability
Background image of page 2
3 Privacy (Confidentiality) Privacy (Confidentiality) • Means that only authorized entities can read information. • There are numerous approaches to provide confidentiality, ranging from physical protection to mathematical algorithms, which render data unintelligible.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Privacy by Symmetric key cryptography Privacy by Symmetric key cryptography • The communicating parties share a common secret key for encryption/decryption – This key must be shared (somehow) before they do the actual business • All “classical” cryptosystems are secret-key based
Background image of page 4
5 Privacy by Asymmetric key cryptography Privacy by Asymmetric key cryptography • Public key cryptosystems provide privacy through Asymmetric key, i.e., through a pair of keys (public, private).
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Privacy by Access Control Privacy by Access Control • Security policy • Indoctrination • Inculcation
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/15/2010 for the course CSE IT325 taught by Professor Maniklaldas during the Fall '09 term at Punjab Engineering College.

Page1 / 20

L02-Cryptography-Overview - Cryptography – An Overview 1...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online