- Introduction to Security
- What do we understand by Security ?
- Why Security ?
- Security is a TOUGH problem
- Prerequisites for understanding the rest of this presentation
- The Basic Security Model
- Secure Communication over Insecure Medium
- What is Cryptography ?
- Computational Difficulty
- Ciphers
- Types of Cryptography Algorithms
- Secret Key Cryptography
- Uses of Secret key Cryptography
- Reflection Attack
- Problem of Secret Key Scheme
- Quick Recap #1
- Public Key Cryptography
- Uses of Public Key Cryptography
- Quick Recap #2
- Uses of Public Key Cryptography
- Using Public Key Cryptography
- Uses of Public Key Cryptography
- Quick Recap #3
- Quick Recap #4
- Hashing Algorithms
- The Mathematics of Hash Functions
- Collisions !!
- Uses of Hashing Algorithms
- Back to Public Keys
- Public key Certificates
- Certificate Hierarchy
- Armed with a Certificate
- Key Management
- Strength of Public Key Cryptography
- Getting a little mathematical
- NetWare Authentication
- That’s All Folks