Cryptography
- Cryptography
- instead
- Replacement
- Cryptanalysis
- analysis
- Exhaustive
Overview
The book focuses on two main areas:
- Cryptographic algorithms and protocols
- Symmetric encryption
- A content data block or the encrypted data stream of any size
- Asymmetric encryption
- Small encrypted data block for
- Data integrity algorithms
- Content protection for data blocks from being modified
- Authentication Protocol
- Used to authenticate the entity's authenticity
- Symmetric encryption
- Network and Internet security
- Deter, prevent, detect and correct security violations occurring during transmission of information
For the definition of computer security
Three key objectives of the core of security (CIA triad):
- Confidentiality Confidentiality
- Data confidentiality
- Privacy
- Integrity Integrity
- Data integrity
- System Integrity
- Availability Availability
The other two are mentioned more concepts:
- Authenticity Authenticity
- Traceability Accountability
OSI Security Framework
- Security attacks
- Passive Attack
- Wiretapping and monitoring
- Treatment focuses on prevention
- Active attack
- Camouflage, replay, message modification and denial of service
- Focus detection processing
- Passive Attack
- Security Mechanism
- Specific: encryption, digital signature, access control, data integrity, authentication exchange, traffic padding, routing control, notarization
- General: credibility, security labels, event detection, security audit trails, security, recovery
- Security Services
- Certification: peer entity authentication, data origin authentication
- Access control
- Data Confidentiality: connection confidentiality, connectionless confidentiality, privacy domain selection, flow confidentiality
- Data integrity: the integrity of the connection with recovery function, connection integrity without recovery function, connection integrity selection field, connectionless integrity, connectionless integrity selection field
- Non-repudiation: repudiation source, sink repudiation