Lecture24_Privacy2

Lecture24_Privacy2 - Computer Applications for Business...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Applications for Business Spring 2008 Instructor: Gayatree Ganu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Topics List: Privacy and Digital Security Types of attacks Encryption decryption systems Public Key cryptography RSA algorithm Redundancy and recovery Threats to security
Background image of page 2
Types of attacks (In communication) Interruption Interception Modification Fabrication
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Encryption And Decryption Encryption Terminology Encryption : Transforming plaintext to cipher text using a key/cipher and an encryption algorithm, so that the information becomes unreadable to unauthorized parties. Cryptosystem : A combination of encryption and decryption methods Cleartext or Plaintext : Information before encryption Cipher text : Information in encrypted form Decryption : Reversing encryption process. Converting cipher text to plain text. Encryption algorithm and encryption key are different.
Background image of page 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Symmetric Cryptography: Caesar Encryption Simple substitution system. Replaces every letter with another letter after shifting by three. For example: A D B E C F and so on Algorithm: Substitution, Key: Shift by k
Background image of page 6
XOR: An Encryption Operation Exclusive OR: Interesting way to apply a key to cleartext Combines two bits by rule: If the bits are the same, the result is 0; if the bits are different, the result is 1 XOR is its own inverse Algorithm: XORing, Key: Specific series of 1s and 0s
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/08/2011 for the course ECONOMICS 101 taught by Professor June during the Spring '08 term at Rutgers.

Page1 / 19

Lecture24_Privacy2 - Computer Applications for Business...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online