Practical Cryptography: An Overview

12/22/98


Click here to start


Table of Contents

Practical Cryptography: An Overview

Shameless (but brief) Marketing

Syllabus

The Basic Problem

The Basic Problem

Defining Terms

Authentication and Integrity

Authentication and Integrity

Privacy or Confidentiality

Basic Cryptography

Cryptographic Algorithm

Cryptographic Algorithm

Cryptographic Key

Encryption Secret-Key (Symmetric)

Encryption Secret-Key (Symmetric)

Encryption Secret-Key (Symmetric)

Encryption Public-Key (Asymmetric)

Encryption Public-Key (Asymmetric)

Encryption Public-Key (Asymmetric)

Encryption Public-Key (Asymmetric)

Key Size Matters

Good Crypto

Hash Functions

Hash Functions

Security Problems Solved by Cryptography

Application Examples

Private E-mail

Integrity and Authentication

Integrity and Authentication

Digitally Signed Message

Integrity and Authentication

Checking a Signed Message

Encryption Hybrid Systems

Adding Privacy

Adding Privacy

Adding Privacy

Adding Privacy

Adding Privacy

Sample Encrypted Message

Sample Encrypted Message

Sample Encrypted Message

Sample Encrypted Message

Files and Directories

Strong User Authentication

Replay Attack

Authentication Techniques

Authentication Techniques

Virtual Private Networks

Privacy

Virtual Private Networks

Extending the Perimeter

Web Site Security

Web Site Security

Web Site Security

Web Site Security

Web Site Security

E-Commerce

Transaction Security

Transaction Security

Transaction Security

Transaction Security

PPT Slide

PPT Slide

Electronic Payment

Where do we go from here?

Infrastructure Needed

Certificates

Certificate

For further reading

Author: Frederick M. Avolio

Email: fred@avolio.com