CRYPTOGRAPHY AND APPLICATIONS ƒ CRYPTOGRAPHY I. ALGORITHMS II. HASH...

2.

Cryptography and Applications

ƒ

Cryptography

i.

Algorithms

ii.

Hashing

iii.

SHA

iv.

Message Digest

v.

Hashing Summary

vi.

Symmetric Encryption

vii.

DES

viii.

3DES

ix.

AES

x.

CAST

xi.

RC

xii.

Blowfish

xiii.

IDEA

xiv.

Symmetric Encryption Summary

xv.

Asymmetric Encryption

xvi.

RSA

xvii.

Diffie-Hellman

xviii.

ElGamal

xix.

ECC

xx.

Asymmetric Encryption Summary

xxi.

Steganography

xxii.

Cryptography Algorithm Use

xxiii.

Confidentiality

xxiv.

Integrity

xxv.

Nonrepudiation

xxvi.

Authentication

xxvii.

Digital Signatures

xxviii.

Key Escrow

xxix.

Cryptographic Applications

ƒ

Public Key Infrastructure

i.

The Basics of Public Key Infrastructures

ii.

Certificate Authorities

iii.

Registration Authorities

iv.

Local Registration Authorities

v.

Certificate Repositories

vi.

Trust and Certificate Verification

vii.

Digital Certificates

viii.

Certificate Attributes

ix.

Certificate Extensions

x.

Certificate Lifecycles

xi.

Centralized or Decentralized Infrastructures

xii.

Hardware Storage Devices

xiii.

Private Key Protection

xiv.

Key Recovery

xv.

Key Escrow

xvi.

Public Certificate Authorities

xvii.

In-house Certificate Authorities

xviii.

Outsourced Certificate Authorities

ƒ

Security in Infrastructure

i.

Physical Security

ii.

The Security Problem

iii.

Physical Security Safeguards