chapter-08 - Encryption Strategies CISE 200 Learning...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Encryption Strategies CISE 200
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd edition 2 Learning Objectives Chronicle the most significant events and discoveries in the history of cryptology Explain the basic principles of cryptography Describe the operating principles of the most popular tools in the area of cryptography List and explicate the major protocols used for secure communications Discuss the nature and execution of the dominant methods of attack used against cryptosystems
Background image of page 2
Principles of Information Security, 3rd edition 3 Foundations of Cryptology Cryptography has been traced from its initial and limited use by the Egyptians some 4000 years ago, to the twentieth century where it played a crucial role in the outcome of both world wars. The predominant practitioners of the art were those associated with the military, the diplomatic service and government in general. Cryptography was used as a tool to protect national secrets and strategies. The proliferation of computers and communications systems in the 1960s brought with it a demand from the private sector for means to protect information in digital form and to provide security services.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Foundations of Cryptology Cont. 1976 with the adoption as a U.S. Federal Information Processing Standard for encrypting unclassified information, DES, the Data Encryption Standard, is the most well-known cryptographic mechanism in history. DES remains the standard means for securing electronic commerce for many financial institutions around the world. In 1977 Rivest, Shamir, and Adleman developed the first practical public-key encryption and signature scheme, now referred to as RSA; published in 1978. In 1991 the first international standard for digital signatures (ISO/IEC 9796) was adopted. It is based on the RSA public-key scheme. 1991 Phil Zimmerman released the first version of Pretty Good Privacy (PGP) as freeware which became the worldwide standard for public cryptosystems. Principles of Information Security, 3rd edition 4
Background image of page 4
Foundations of Cryptology Cont. 2000 Rijndael’s cipher was selected as the Advanced Encryption Standard (AES). The search for new public-key schemes, improvements to existing cryptographic mechanisms, and proofs of security continues at a rapid pace. Various standards and infrastructures involving cryptography are being put in place. Security products are being developed to address the security needs of an information intensive society. Principles of Information Security, 3rd edition 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Foundations of Cryptology Cont. Information security and cryptosystems should be evaluated with respect to various criteria such as: Level of Security: quantifying the level of security necessary to protect assets and/or defeat the objective. Functionality:
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Page1 / 70

chapter-08 - Encryption Strategies CISE 200 Learning...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online