You are on page 1of 5

.

)

( - ) (
) (packet sniffing
:


(
computer
hacking
)

) (hoaxes .



.

.


.


.





: ) (privacy )(Integrity
).(peer authentication
)(Privacy


.
:

) (passwords ) (firewall

) .(authorization certificates


.


)
:
(eavesdropping .
)(Integrity


.



.

.
.
: )(message digest
) (encryption
) (anti-virus software
.
) (backup


.
)(Peer Authentication

)
( .
: ) (passwords
) (digital signatures ) (digital certificates
.
: ) (finger print .

) (Caesar Cipher

)(Cipher text .

).(Enigma machine



.

) (IBM
.




) .(Lucifer


.


.

)National Institute of Standards and Technology-
(NIST )U.S.
1973
(National Bureau of Standards
).(Data Encryption Standard- DES

) (Lucifer algorithm
56 ) (bit

.


1976 ).(ATM

) (DES
) (RSA

) ) (public key )((private key
.

.
) (Phil Zimmerman 1986
) (RSA 128

) .(Pretty Good Privacy- PGP




.
)(encryption
)


(


.


. )

(


)

(encryption ) .(decryption

)( .

) .((bits
: )

.

) (Symmetric Cryptography )Secret

(Key

.
)) (passphrase (
.


.
.



.

)cipher text or encrypted

)

(text


(binary key
.
.DES


.

)(Symmetric Cryptography

) (Asymmetric Cryptography )Public


(key



. )
(public key ) .(private key





.
RSA
DES
. RSA

PGP

.RSA PGP 128


) .(message digest
.

You might also like