×
Language:

Unit 1 : Cryptography Basics Introduction and Key Terms
LEARN CRYPO & PKI
Cryptography  A technology for protecting you digital asset And then design Security Solution

Introduction and Key Terms Unit 1 : Cryptography Basics
TRAINING CRYPTOGRAPHY & PKI
Author:

Sylvain Maret
Security architect, PKI instructor & Checkpoint instructor(Checkpoint CCSE)Dimension Data (Swiss) formerly Datelec
Cédric Enzler
IPSEC & cryptographic engineer, PKI instructorDimension Data (Swiss) formerly Datelec
Revision:
Version 1.5, October 1999, rev. August 2000

Unit 1 : Cryptography Basics Introduction and Key Terms
Learn Crypo & PKI _______________________________________________1

Training Cryptography & PKI ______________________________________2

1.

Cryptography Basics___________________________________________5

1.1.

Introduction _______________________________________________________5

1.2.

Key terms _________________________________________________________5

1.3.

Miscellaneous Cryptosystems _________________________________________7

1.3.1.

Secret Key__________________________________________________________7

1.3.2.

Public Key__________________________________________________________7

1.3.3.

Message Digest______________________________________________________7

1.4.

Cryptography in history _____________________________________________8

1.5.

Cryptoanalysis ____________________________________________________20

1.6.

1.6.1.

Overview of the AES Development Effort________________________________22

1.6.2.

Minimum Acceptability Requirements___________________________________23

1.6.3.

AES Round 2 Finalists________________________________________________23

1.7.

Smart Cards ______________________________________________________25

1.7.1.

Introduction________________________________________________________25

1.7.2.

What kinds of Smart Cards are available?_________________________________25

1.7.3.

Symmetric / Asymmetric Cryptoprocessing_______________________________26

1.7.4.

Smart Cards with different “flavor”______________________________________26

1.7.5.

Memory Cards______________________________________________________26

1.7.6.

Symmetric Cryptoprocessor Cards______________________________________27

1.7.7.

PKI Smart Cards____________________________________________________27

2.

PKI Applications (lab exercises)_________________________________29

2.1.

Symmetric file encryption ___________________________________________29

2.1.1.

Lab Exercise 1______________________________________________________29

2.2.

Message-Digest Algorithms __________________________________________33

2.2.1.

Lab Exercise 2______________________________________________________33

2.3.

Securing the desktop _______________________________________________37

2.3.1.

Introduction________________________________________________________37

2.3.2.

2.3.3.

Lab Exercise 3______________________________________________________40

2.4.

PGP (Pretty Good Privacy) __________________________________________46

2.4.1.

The PGP Symmetric Algorithms________________________________________46

2.4.2.

2.4.3.

About the Random Numbers used as Session Keys__________________________48

2.4.4.

2.4.5.

Encryption and Decryption____________________________________________49

2.4.6.

Digital Signature for PGP_____________________________________________50

Search History:
Searching...
Result 00 of 00
00 results for result for
• p.
• Notes