CSCI 4531 Lecture Notes - Lecture 6: Bitstream, Maximum Segment Size, Data Encryption Standard
Document Summary
The nist computer security handbook defines the term computer security as . The protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data and communications) ** figure 1. 1 displays the security requirements triad ** ** figure 2. 1 displays the simplified model of symmetric encryption ** ** figure 20. 2 displays a triple des (one of the des modes) ** ** figure 20. 6 displays cipher block chaining (cbc) mode (one of the encryption modes) ** ** diagram a shows encryption with a public key ** ** diagram b shows encryption with a private key ** Can be applied to a block of data of any size. H(x) is relatively easy to compute for any given x. Computationally infeasible to find x such that h(x) = h such that h(y) = h(x)