CSCI 4541 Midterm: Midterm Study Guide

106 views45 pages

Document Summary

Note: this document contains a cohesive compilation of all lecture notes from the first half of the semester, including figures, tables, and diagrams from the slides. The majority of this information comes from the lecture slides, as well as information the professor gets from the textbook. Course intro of network security and recap of computer security. The nist computer security handbook defines the term computer security as . The protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data and communications) Can be applied to a block of data of any size. H(x) is relatively easy to compute for any given x. Computationally infeasible to find x such that h(x) = h such that h(y) = h(x) Computationally infeasible to find any pair (x, y) such that h(x) = h(y) To use, without modifications, available hash functions.