Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
36Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Cryptography_Basics_PKI

Cryptography_Basics_PKI

Ratings: (0)|Views: 1,200 |Likes:
Published by Sylvain MARET
Training PKI and Cryptography
Training PKI and Cryptography

More info:

Published by: Sylvain MARET on Apr 18, 2009
Copyright:Traditional Copyright: All rights reserved

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/11/2014

pdf

text

original

 
Unit 1 : Cryptography Basics Introduction and Key Terms
LEARN CRYPO & PKI
« La Citadelle électronique »
Cryptography  A technology for protecting you digital asset And then design Security Solution
 
Introduction and Key Terms Unit 1 : Cryptography Basics
TRAINING CRYPTOGRAPHY & PKI
 Author:
 
Sylvain Maret
 Security architect, PKI instructor & Checkpoint instructor(Checkpoint CCSE)Dimension Data (Swiss) formerly Datelec
Cédric Enzler
IPSEC & cryptographic engineer, PKI instructorDimension Data (Swiss) formerly Datelec
Revision:
Version 1.5, October 1999, rev. August 2000
 
Unit 1 : Cryptography Basics Introduction and Key Terms
TABLE OF CONTENTS
 Learn Crypo & PKI _______________________________________________1
 
Training Cryptography & PKI ______________________________________2
 
Table of contents _________________________________________________3
 
1.
 
Cryptography Basics___________________________________________5
 
1.1.
 
Introduction _______________________________________________________5
 
1.2.
 
Key terms _________________________________________________________5
 
1.3.
 
Miscellaneous Cryptosystems _________________________________________7
 
1.3.1.
 
Secret Key__________________________________________________________7
 
1.3.2.
 
Public Key__________________________________________________________7
 
1.3.3.
 
Message Digest______________________________________________________7
 
1.4.
 
Cryptography in history _____________________________________________8
 
1.5.
 
Cryptoanalysis ____________________________________________________20
 
1.6.
 
AES (Advanced Encryption Standard) ________________________________22
 
1.6.1.
 
Overview of the AES Development Effort________________________________22
 
1.6.2.
 
Minimum Acceptability Requirements___________________________________23
 
1.6.3.
 
AES Round 2 Finalists________________________________________________23
 
1.7.
 
Smart Cards ______________________________________________________25
 
1.7.1.
 
Introduction________________________________________________________25
 
1.7.2.
 
What kinds of Smart Cards are available?_________________________________25
 
1.7.3.
 
Symmetric / Asymmetric Cryptoprocessing_______________________________26
 
1.7.4.
 
Smart Cards with different “flavor”______________________________________26
 
1.7.5.
 
Memory Cards______________________________________________________26
 
1.7.6.
 
Symmetric Cryptoprocessor Cards______________________________________27
 
1.7.7.
 
PKI Smart Cards____________________________________________________27
 
 2.
 
 PKI Applications (lab exercises)_________________________________29
 
2.1.
 
Symmetric file encryption ___________________________________________29
 
2.1.1.
 
Lab Exercise 1______________________________________________________29
 
2.2.
 
Message-Digest Algorithms __________________________________________33
 
2.2.1.
 
Lab Exercise 2______________________________________________________33
 
2.3.
 
Securing the desktop _______________________________________________37
 
2.3.1.
 
Introduction________________________________________________________37
 
2.3.2.
 
Blowfish Advanced CS_______________________________________________37
 
2.3.3.
 
Lab Exercise 3______________________________________________________40
 
2.4.
 
PGP (Pretty Good Privacy) __________________________________________46
 
2.4.1.
 
The PGP Symmetric Algorithms________________________________________46
 
2.4.2.
 
About PGP Data Compression Routines__________________________________47
 
2.4.3.
 
About the Random Numbers used as Session Keys__________________________48
 
2.4.4.
 
About the Message Digest_____________________________________________48
 
2.4.5.
 
Encryption and Decryption____________________________________________49
 
2.4.6.
 
Digital Signature for PGP_____________________________________________50
 

Activity (36)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
slimane00 liked this
Huacheng Cai liked this
Latasha Marks liked this
bernard_ny liked this
felayyach liked this
felayyach liked this
Pippo Belou liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->