Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Security 2 - Cryptography (Secret Key or Private Key Cryptography,…
Network Security 2 - Cryptography
Shannons Guide
implementation simple as possible
size of enciphered text not larger than original
Secret Key or Private Key Cryptography
same key to encrypt and decrypt
key must securely transmitted to receiver
algorithms
DES - Data Encryption Standard
AES - Advanced Encryption Standard
Assymetric Key or Public Key Cryptography
private key and public key
algorithms
DSA - Digital Signature Algorithm
RSA - Rives Shamir Adleman
ECC - Eliptic Curve Cryptographie
Cryptographic Handshakes
2 parties need a handshake to authenticate
goals:
mutual authentication
immune from replay and other attacks
minimize number of messages
establish session key