Lecture24_Privacy2

# Lecture24_Privacy2 - Computer Applications for Business...

This preview shows pages 1–8. Sign up to view the full content.

Computer Applications for Business Spring 2008 Instructor: Gayatree Ganu

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
Topics List: Privacy and Digital Security Types of attacks Encryption decryption systems Public Key cryptography RSA algorithm Redundancy and recovery Threats to security
Types of attacks (In communication) Interruption Interception Modification Fabrication

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
Encryption And Decryption Encryption Terminology Encryption : Transforming plaintext to cipher text using a key/cipher and an encryption algorithm, so that the information becomes unreadable to unauthorized parties. Cryptosystem : A combination of encryption and decryption methods Cleartext or Plaintext : Information before encryption Cipher text : Information in encrypted form Decryption : Reversing encryption process. Converting cipher text to plain text. Encryption algorithm and encryption key are different.

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
Symmetric Cryptography: Caesar Encryption Simple substitution system. Replaces every letter with another letter after shifting by three. For example: A D B E C F and so on Algorithm: Substitution, Key: Shift by k
XOR: An Encryption Operation Exclusive OR: Interesting way to apply a key to cleartext Combines two bits by rule: If the bits are the same, the result is 0; if the bits are different, the result is 1 XOR is its own inverse Algorithm: XORing, Key: Specific series of 1s and 0s

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
This is the end of the preview. Sign up to access the rest of the document.

## This note was uploaded on 02/08/2011 for the course ECONOMICS 101 taught by Professor June during the Spring '08 term at Rutgers.

### Page1 / 19

Lecture24_Privacy2 - Computer Applications for Business...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online