ITM 820 Chapter Notes - Chapter 5: Plaintext, Digital Signature, Public-Key Cryptography

117 views3 pages

Document Summary

Cryptography is where security engineering meets mathematics. Cryptography provides us with the tools that underlie most modern security protocols. A security engineer need to be familiar with cryptology as well as computer security. Cryptography: the science and art of designing ciphers. Cryptanalysis: the science and art of breaking them the input to an encryption process is called plaintext the output to an encryption process is called cipher text. There are a number of cryptographic primitives: block ciphers. May either have one key for both encryption and decryption, they are called shared-key (secret key or symmetric) Separate keys for encryption and decryption, they are called public key or asymmetric. Digital signature scheme: is a special type of asymmetric crypto primitive. There are basically two ways to make a stronger cipher: the stream cipher and the block cipher. 5. 2. 1 an early stream cipher the vigenere.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents