Uses of Hashing Algorithms
Slide 28 of 37
Go to slide:
1: Introduction to Security
2: What do we understand by Security ?
3: Why Security ?
4: Security is a TOUGH problem
5: Prerequisites for understanding the rest of this presentation
6: The Basic Security Model
7: Secure Communication over Insecure Medium
8: What is Cryptography ?
9: Computational Difficulty
10: Ciphers
11: Types of Cryptography Algorithms
12: Secret Key Cryptography
13: Uses of Secret key Cryptography
14: Reflection Attack
15: Problem of Secret Key Scheme
16: Quick Recap #1
17: Public Key Cryptography
18: Uses of Public Key Cryptography
19: Quick Recap #2
20: Uses of Public Key Cryptography
21: Using Public Key Cryptography
22: Uses of Public Key Cryptography
23: Quick Recap #3
24: Quick Recap #4
25: Hashing Algorithms
26: The Mathematics of Hash Functions
27: Collisions !!
28: Uses of Hashing Algorithms
29: Back to Public Keys
30: Public key Certificates
31: Certificate Hierarchy
32: Armed with a Certificate
33: Key Management
34: Strength of Public Key Cryptography
35: Getting a little mathematical
36: NetWare Authentication
37: That’s All Folks
4.2.4 In case this makes the secret key algorithms nervous about job security, since they can be replaced by hash algorithms, we 'll show that a hash algorithm can be replaced by a secret key algorithm.....