TAILIEUCHUNG - The Introduction to Encryption II

This is the second of two of the most important classes we have the privilege to teach as part of the SANS Security Essentials course. In the first course, we went on a quick tour of some of the important issues and concepts in the field of cryptography. We saw that encryption is real, it is crucial, it is a foundation of so much that happens in the world around us today --and, most of it in a manner that is completely transparent to us. | Introduction to Encryption II Security Essentials The SANS Institute Encryption and Exploits - SANS 2001 1 This is the second of two of the most important classes we have the privilege to teach as part of the SANS Security Essentials course. In the first course we went on a quick tour of some of the important issues and concepts in the field of cryptography. We saw that encryption is real it is crucial it is a foundation of so much that happens in the world around us today --and most of it in a manner that is completely transparent to us. I guess you know that one of SANS mottos is Never teach anything in a class which the student can t use at work the next day. One of our goals in this course is to help you be aware of how cryptography operates under the covers in some of the major cryptosystems which are used on a 24x7 basis in our world. Along the way we ll share some hard-earned pragmatic lessons we ve learned and hope that our experience will be of help to you. Enjoy 2 - 1 Why Do I Care About Crypto . Dept. of Commerce no longer supports DES. E-Business E-Commerce Privacy Mobile Code Smart Cards Public Key Infrastructure PKI Digital Certificates Digital Signatures National Institute of Standards and Technology NIST is leading the development of AES --the replacement for DES. Adversary Distributed Denial of Service attack daemon found to be protected by blowfish --a DES-like block cipher. ly The Internet Insecure Global Networks Alice Bob Communications in the presence of adversaries. Confidentiality Integrity Authentication Non-repudiation Encryption II - SANS 2001 2 Without cryptography there is no e-business no viable e-commerce infrastructures no military presence on the Internet and no privacy for the citizens of the world. There are numerous and continually increasing everyday instances in which we encounter cryptosystems at work and at play often without even realizing it. The underlying cryptographic infrastructure actually works so well that we only

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.