NOTE: This is a frame enhanced page. Best viewed in a web browser that supports frames (e.g. Netscape or Internet Explorer).
Introduction to Security
Table of Contents
Select a slide or start at the
beginning
.
Introduction to Security
What do we understand by Security ?
Why Security ?
Security is a TOUGH problem
Prerequisites for understanding the rest of this presentation
The Basic Security Model
Secure Communication over Insecure Medium
What is Cryptography ?
Computational Difficulty
Ciphers
Types of Cryptography Algorithms
Secret Key Cryptography
Uses of Secret key Cryptography
Reflection Attack
Problem of Secret Key Scheme
Quick Recap #1
Public Key Cryptography
Uses of Public Key Cryptography
Quick Recap #2
Uses of Public Key Cryptography
Using Public Key Cryptography
Uses of Public Key Cryptography
Quick Recap #3
Quick Recap #4
Hashing Algorithms
The Mathematics of Hash Functions
Collisions !!
Uses of Hashing Algorithms
Back to Public Keys
Public key Certificates
Certificate Hierarchy
Armed with a Certificate
Key Management
Strength of Public Key Cryptography
Getting a little mathematical
NetWare Authentication
That’s All Folks
Play
auto-running slide show...
Back to
Home Page
Comments or Questions?