Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security - Coggle Diagram
Information Security
Hashing
Concepts & Requirements
Compression
Efficiency
Trap-door
Collision
Why Hash?
Verify integrety of message
Authentication
Message fingerprinting
Digital signatures
Algorithms
Cyclic Redundancy Check
Hashed Message Authentication Code
MDx
SHA
Tiger
Sharing Secrets
Key Escrow
Stenography
Simple way
Basics
Definitions
Cipher / Cryptosystem
Plaintext
Plaintext
Encrypt
Decrypt
Symmetric Key Cryptosystem
Public / Asymmetric Key Cryptosystem
Provably Secure
Principles
Kerckoff's
Claude Shannon's Fundamental Principles
Confusion
Diffusion
Cryptography
More Complex Ciphers
Transposition Cipher
Stream Cipher (RC4)
Block Cipher (Feistel, DES, 3DES)
Knapsack
Vernam Cipher
Simple Ciphers
Caesar
Vigenere Cipher
Subsitution Cipher
Access Control
Protocols
Privacy