Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protocols, Applications and Attacks Computer Security 14/10/2019…
Protocols, Applications and Attacks
Computer Security
14/10/2019
Protocols
are a series of steps involving two or more parties
Everyone must know all of the steps to follow in advance
for the
nonce
: for the time being
Nonces are a key device in security protocols
Symmetric encryption is more efficient usually
Denning-Sacco attack
MITM = man in the middle (attack)
Application : Crypto Hash Function
MAC
shared keys
Public Key Infrastructure
(PKI)
To bind public keys to identities
Typically based on some trusted third party (TTP) called a cerificate Authority (CA)
Attacks
n Ciphertext-only attack
n Known-plaintext attack
n Chosen-plaintext attack
n Chosen-ciphertext attack
in class TEST: 1 hour- crypt 10 questions. multiple choice questions
application & memorisation