CSCI 4531 Lecture Notes - Lecture 6: Bitstream, Maximum Segment Size, Data Encryption Standard

104 views6 pages

Document Summary

The nist computer security handbook defines the term computer security as . The protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data and communications) ** figure 1. 1 displays the security requirements triad ** ** figure 2. 1 displays the simplified model of symmetric encryption ** ** figure 20. 2 displays a triple des (one of the des modes) ** ** figure 20. 6 displays cipher block chaining (cbc) mode (one of the encryption modes) ** ** diagram a shows encryption with a public key ** ** diagram b shows encryption with a private key ** Can be applied to a block of data of any size. H(x) is relatively easy to compute for any given x. Computationally infeasible to find x such that h(x) = h such that h(y) = h(x)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents