Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Engineering - Coggle Diagram
Security
Engineering
History
Caesar Cipher
Shift Charactors
Scytale
Wrapped around a rod
Vignere
Keyword
Vernam (One-time Pad)
One-time Key
Equal Length
Unpredictable
Enigma Machine
Services
Privacy
Authenticity
Integrity
Non-repudiation
Algorithms
Qualities
Confusion
Diffusion
Avalanche
Permutations
Open
Key
Long
Random
Secret
Symmetric
Same Key
Privacy
80 - 256 bit Keys
Simpler Algorithms
Fast
Ex
DES
3DES
AES
IDEA
RC2 / RC4 / RC5 / RC6
Blowfish
Asymmetric
Public Key Algorithms
Cofidentiality
Pub.Key (Encrypt) + Priv.Key (Decrypt)
Authentication
Priv.Key (Encrypt) + Pub.Key (Decrypt)
Confidentiality
Authenticity
Integrity
Encrypt Message (B Pub.Key) --> Hash
Confidentiality
Encrypt Hash (A Priv.Key) --> Encrypted Hash
Decrypt (A Pub.Key) --> Hash
Authentication & Integrity
Decrypt (B. Priv.Key) --> Message
Key Distribution`
Out-of-band