Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
cryptography

cryptography

Ratings: (0)|Views: 8|Likes:
Published by Shantanu Sangwan
nice material
nice material

More info:

Published by: Shantanu Sangwan on Feb 03, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/27/2013

pdf

text

original

 
Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09-13 May 2005
Cryptography and NetworkSecurity
Bhaskaran Raman
Department of CSE, IIT Kanpur
Reference:
Whitfield Diffie and Martin E. Hellman, “Privacy andAuthentication: An Introduction to Cryptography”, in Proc. IEEE,vol. 67, no.3, pp. 397 - 427, 1979
 
Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09-13 May 2005
Cryptography Fundamentals
Privacy versus Authentication:
 –
Privacy: preventing third party from snooping
 –
Authentication: preventing impostering
Two kinds of authentication:
 –
Guarantee that no third party has modified data
 –
Receiver can prove that only the senderoriginated the data
Digital Signature
E.g., for electronic transactions
 
Fundamentals of Wired and Wireless Networks, Kameswari Chebrolu and Bhaskaran Raman, 09-13 May 2005
Cryptographic Privacy
Encrypt before sending, decrypt on receiving
 –
Terms: plain text and cipher text
Two components: key, and the algorithm
 –
Should algorithm be secret?
Yes, for military systems; no, for commercial systems
Key distribution must be secure
Sender Encryption
P
Decryption Receiver
PC
Eavesdropper
 Network 
C= S
K
(P)C= S
-1K
(P)Key: K

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->