Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMP3632 (Cryptography (SKE(Symmetric/Secret Key Encryption) (Block Cipher…
COMP3632
Cryptography
Kerckhoffs’ Principle
The key(s) of a cryptosystem should be hidden,
but the mechanisms should be public.
-
-
-
Integrity
Cryptographic Hash
-
MD5(insecure!), SHA1, SHA2, SHA3
-
During file transmission
send M, h(M)
Attacker can send M', h(M')
-
-
-
Attacks
-
-
Yahoo hacks (2014, 2016, 2017)
Malware
By method of spread
-
Worm
-
-
Examples
Slammer Worm(2003, Windows)
-
-
Blaster Worm(2003, Windows)
-
-
Conficker Worm(2008, Windows)
-
Trojan
-
-
-
-
Zip bomb, email bomb, compiler bomb
-
-
-
-
-
-
Terms
Privacy
-
Protection of identity, behavior, expression
Security
Protection of assets, systems, secrets
-
-
-
-