Introduction to Encryption II

Without cryptography there is no e-business, no viable e-commerce infrastructures, no military presence on the Internet and no privacy for the citizens of the world. There are numerous and continually increasing everyday instances in which we encounter cryptosystems at work and at play, often without even realizing it. The underlying cryptographic infrastructure actually works so well that we only take notice when it is absent, or implemented incorrectly! | Introduction to Encryption II SANS GIAC LevelOne Security Essentials Introduction to Encryption II SANS GIAC LevelOne 2000 2001 1 Hello the primary author of this course is Harish Bhatt with updates by Stephen Northcutt and Eric Cole. This is the second of two of the most important classes we have the privilege to teach as part of GIAC. In the first course we went on a quick tour of some of the important issues and concepts in the field of cryptography. We saw that encryption is real it is crucial it is a foundation of so much that happens in the world around us today --and most of it in a manner that is completely transparent to us. I guess you know that one of SANS mottos is to never teach anything in a class which the student can t use at work the next day. One of our goals in this course is to help you be aware of how cryptography operates under the covers in some of the major cryptosystems which are used on a 24x7 basis in our world. Along the way we ll share some hard-earned pragmatic lessons we ve learned and hope that our experience will be of help to you. Enjoy 6 - 1 Why Do I Care About Crypto . Dept. of Commerce no longer supports DES. E-Business E-Commerce Privacy Mobile Code Smart Cards National Institute of Standards and Technology NIST is leading the development of AES --the replacement for DES. Public Key Infrastructure PKI Digital Certificates Digital Signatures Adversary The Internet Distributed Denial of Service attack daemon found to be protected by blowfish --a DES-like block cipher. Insecure Global Networks Alice Communications in the presence of Confidentiality Integrity Authentication Non-Repudiation Introduction to Encryption II SANS GIAC LevelOne 2000 2001 2 Without cryptography there is no e-business no viable e-commerce infrastructures no military presence on the Internet and no privacy for the citizens of the world. There are numerous and continually increasing everyday instances in which we encounter cryptosystems at

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
2    116    3    22-05-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.