120 likes | 382 Views
Cryptography. in network security. Kayla Henneman CS 555. Goal: Secure Communication Confidentiality Authentication Access Control Non-Repudiation. Why we need cryptography. Encryption Decryption Algorithm Key Symmetric Asymmetric. What is Cryptography. Algorithms:.
E N D
Cryptography in network security Kayla Henneman CS 555
Goal: Secure Communication • Confidentiality • Authentication • Access Control • Non-Repudiation Why we need cryptography
Encryption • Decryption • Algorithm • Key • Symmetric • Asymmetric What is Cryptography
Algorithms: http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg
Substitution • Transposition • Combinational http://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png Techniques for cryptography http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg
Secure Socket Layer/Transport Layer Security • Provides communication security between the transport layers of two hosts • Provides a secure tunnel between two hosts • Widely used to secure web shopping Example: SSL/TLS
SSL/TLS Handshake http://minnie.tuhs.org/NetSec/Slides/week7.html
http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpghttp://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg • http://www.mcpressonline.com/articles/images/2002/Encryption%20GuideV4--04230700.jpg • http://minnie.tuhs.org/NetSec/Slides/week7.html • http://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png References: