TAILIEUCHUNG - Lecture Data security and encryption - Lecture 1: Introduction to Data Security and Encryption

This chapter presents the following content: Outline of the course is discussed; topic roadmap & standards organizations; security concepts; security architecture; security attacks, services, mechanisms; models for network (access) security. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Dr. Basit Raza Assistant Professor Comsats Institute of Information Technology, Islamabad My name is Dr. Basit Raza and I am working as Assistant Professor in Comsats Institute of Information Technology, Islamabad. I have PhD in Computer Science. My area of specialization is all about data related such as Database, Data Management and Data warehouse. I have done My MS and PhD in Computer Science. Course Outline In this course we will follow the mentioned book Cryptography and Network Security”, 5th Edition by William Stallings. The book is organized into seven parts: Course Outline Part One: Symmetric Ciphers: Provides a survey of symmetric encryption, including classical and modern algorithms. The emphasis is on the two most important algorithms, the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES).This part also covers the most important stream encryption algorithm,RC4,and the important topic of pseudorandom number generation. Course Outline Part Two: Asymmetric Ciphers: Provides a survey of public-key algorithms, including RSA (Rivest-Shamir-Adelman) and elliptic curve. Course Outline Part Three: Cryptographic Data Integrity Algorithms: Begins with a survey of cryptographic hash functions. This part then covers two approaches to data integrity that rely on cryptographic hash functions: message authentication codes and digital signatures. Course Outline Part Four: Mutual Trust: Covers key management and key distribution topics and then covers user authentication techniques. Course Outline Part Five: Network Security and Internet Security: Examines the use of cryptographic algorithms and security protocols to provide security over networks

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.