类别 全部 - security - integrity - encryption - network

作者:Robert Mccausland 16 年以前

2364

Cryptography

The text delves into various aspects of cryptography and its applications in securing information. It covers key management practices, including the creation, distribution, storage, and destruction of cryptographic keys.

Cryptography

Cryptography

Network Security

IPSEC
VPN
SSL

Alternatives

Watermarking
Steganography

PKI

Certificate Authority

e--mail security

S/MIME
PGP

Non Repudiation

Crypto Attack

Implementation Attacks
Chosen Cipher text
Frequency analysis
Known plaintext
Cipher-text only
Brute force
Social engineering for key discovery
Chosen plain text

Signatures

Digests/Hashing

HMAC
SHA

MD5

Key management

Key escrow
Recovery
Storage/destruction
Creation/distribution

Crypto systems

Hashing
Message digest
Hybrid
Asymmetric
Symmetric

Initialisation Vector

Encryption

Block
Stream

Methods

Substitution
One-time pads

Uses

In Transit
At Rest
Availability
Integrity
Confidentiality