Overview catalog

Books Cryptography and Network Security

Cryptography

  • Cryptography
    • instead
    • Replacement
  • Cryptanalysis
    • analysis
    • Exhaustive

Overview

The book focuses on two main areas:

  • Cryptographic algorithms and protocols
    • Symmetric encryption
      • A content data block or the encrypted data stream of any size
    • Asymmetric encryption
      • Small encrypted data block for
    • Data integrity algorithms
      • Content protection for data blocks from being modified
    • Authentication Protocol
      • Used to authenticate the entity's authenticity
  • Network and Internet security
    • Deter, prevent, detect and correct security violations occurring during transmission of information

For the definition of computer security

Three key objectives of the core of security (CIA triad):

  • Confidentiality Confidentiality
    • Data confidentiality
    • Privacy
  • Integrity Integrity
    • Data integrity
    • System Integrity
  • Availability Availability

The other two are mentioned more concepts:

  • Authenticity Authenticity
  • Traceability Accountability

OSI Security Framework

  • Security attacks
    • Passive Attack
      • Wiretapping and monitoring
      • Treatment focuses on prevention
    • Active attack
      • Camouflage, replay, message modification and denial of service
      • Focus detection processing
  • Security Mechanism
    • Specific: encryption, digital signature, access control, data integrity, authentication exchange, traffic padding, routing control, notarization
    • General: credibility, security labels, event detection, security audit trails, security, recovery
  • Security Services
    • Certification: peer entity authentication, data origin authentication
    • Access control
    • Data Confidentiality: connection confidentiality, connectionless confidentiality, privacy domain selection, flow confidentiality
    • Data integrity: the integrity of the connection with recovery function, connection integrity without recovery function, connection integrity selection field, connectionless integrity, connectionless integrity selection field
    • Non-repudiation: repudiation source, sink repudiation

Network Security Model

avatar

Network Access Security Model

avatar

table of Contents

Symmetric cryptography

Guess you like

Origin www.cnblogs.com/saltedcorgi/p/12034392.html