Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 7: Cryptography - Coggle Diagram
Chapter 7: Cryptography
What is Cryptography?
Unencrypted Information
Encrypted Information
Basic Cryptographic Principles
A Brief History of Cryptography
20th-Century Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
21st Century Cryptography
Quantum Cryptography
Cryptography's Role in Information Security
Confidentiality
Integrity
Authentication
Nonrepudiation
Business and Security Requirements for Cryptography
Internal Security
Integrity
Authorization
Privacy
Confidentiality
Access Control
Security in Business Relationships
Message Authentication
Signature
Receipt and Confirmation
Nonrepudiation
Security Measures That Benefit Everyone
Revocation
Ownership
Timestamping
High Resiliency
Anonymity
Supporting Obfuscation
Cryptographic Principles, Concepts, and Terminology
Cryptographic Functions and Ciphers
Security Implementation for Businesses
Entity Authentication or Identification
Message Authentication
Signature
Integrity
Privacy or Confidentiality
Access Control
Certification
Timestamping
Witnessing
Ownership
Anonymity
Nonrepudiation
Types of Ciphers
Transportation Ciphers
Substitution Ciphers
Product and Exponentiation Ciphers
Symmetric and Asymmetric Ciphers
Symmetric Key Ciphers
Asymmetric Key Ciphers
Cryptanalysis and Public Versus Private Keys
Chosen-ciphertext attack
Chosen-plaintext attack
Known-plaintext attack (KPA)
Ciphertext-only attack (COA)
Keys, Keyspace, and Key Management
Cryptographic Keys and Keyspace
Key Management
Key Distribution
Paper
Digital Media
Hardware
Key Distribution Centers
Digital Signatures and Hash Functions
Hash Functions
Digital Signatures
Cryptographic Applications and Uses in Information System Security
Other Cryptographic Tools and Resources
Symmetric Key Standards
International Data Encryption Algorithm
CAST
Triple DES
Blowfish
Data Encryption Standard
Advanced Encryption Standard
RC2
RC4
Wireless Security
802.11
Asymmetric Key Solutions
Hash Function and Integrity
Digital Signatures and Nonrepudiation
Principles of Certificates and Key Management
Modern Key Management Techniques
XKMS
ISAKMP
Managed PKI
ANSI X9.17
IPSec
AES