VII
Security
Security Topics
1
Chapters
Chapter 29 Cryptography
Chapter 30 Message Authentication, User
Authentication, and Key
Management
Chapter 31 Security Protocols in The Internet
Chapter 29
Cryptography
2
29.1 Introduction
Introduction
to
Cryptography
3
Figure 29.2 Encryption and decryption
Note:
In cryptography,
the encryption/decryption algorithms
are public; the keys are secret.
4
29.2 Symmetric-Key Cryptography
Traditional Cipher
Block Cipher
Operation Modes
5
Note:
Note:
6
Note:
7
Figure 29.5 Example of monoalphabetic substitution
Note:
8
Figure 29.6 Vigenere cipher
Note:
9
Figure 29.7 Transpositional cipher
10
Figure 29.9 P-box
11
Figure 29.11 Product block
12
Figure 29.13 General scheme of DES
13
Figure 29.15 Triple DES
Note:
14
Figure 29.16 ECB mode
15
Figure 29.18 CFM
16
29.3 Public-Key Cryptography
RSA
17
Note:
18