Table of Contents
Practical Cryptography: An Overview
Shameless (but brief) Marketing
Syllabus
The Basic Problem
The Basic Problem
Defining Terms
Authentication and Integrity
Authentication and Integrity
Privacy or Confidentiality
Basic Cryptography
Cryptographic Algorithm
Cryptographic Algorithm
Cryptographic Key
Encryption Secret-Key (Symmetric)
Encryption Secret-Key (Symmetric)
Encryption Secret-Key (Symmetric)
Encryption Public-Key (Asymmetric)
Encryption Public-Key (Asymmetric)
Encryption Public-Key (Asymmetric)
Encryption Public-Key (Asymmetric)
Key Size Matters
Good Crypto
Hash Functions
Hash Functions
Security Problems Solved by Cryptography
Application Examples
Private E-mail
Integrity and Authentication
Integrity and Authentication
Digitally Signed Message
Integrity and Authentication
Checking a Signed Message
EncryptionHybrid Systems
Adding Privacy
Adding Privacy
Adding Privacy
Adding Privacy
Adding Privacy
Sample Encrypted Message
Sample Encrypted Message
Sample Encrypted Message
Sample Encrypted Message
Files and Directories
Strong User Authentication
Replay Attack
Authentication Techniques
Authentication Techniques
Virtual Private Networks
Privacy
Virtual Private Networks
Extending the Perimeter
Web Site Security
Web Site Security
Web Site Security
Web Site Security
Web Site Security
E-Commerce
Transaction Security
Transaction Security
Transaction Security
Transaction Security
PPT Slide
PPT Slide
Electronic Payment
Where do we go from here?
Infrastructure Needed
Certificates
Certificate
For further reading
|