Page 108 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 108
Information Security and Privacy Mithilesh Kumar Dubey, Lovely Professional University
Notes Unit 8: Cryptography and Encryption
CONTENTS
Objectives
Introduction
8.1 Cryptography and Encryption
8.2 Applications of Cryptography
8.2.1 Secrecy in Transmission
8.2.2 Secrecy in Storage
8.2.3 Integrity in Transmission
8.2.4 Integrity in Storage
8.2.5 Authentication of Identity
8.2.6 Credentialing Systems
8.2.7 Electronic Signatures
8.2.8 Electronic Cash
8.2.9 Threshold Systems
8.2.10 Systems using Changing Keys
8.2.11 Hardware to Support Cryptography
8.3 Digital Certificates
8.3.1 Verifying the Certificate
8.4 Digital Signature
8.5 Cryptographic Algorithms
8.5.1 Symmetric (or Shared) Key Cryptography
8.5.2 Public Key Cryptography
8.5.3 Hashing
8.5.4 Pretty Good Privacy (PGP)
8.5.5 Kerberos
8.6 Summary
8.7 Keywords
8.8 Review Questions
8.9 Further Readings
Objectives
After studying this unit, you will be able to:
Understand the meaning of cryptography and encryption
Recognize applications of cryptography
102 LOVELY PROFESSIONAL UNIVERSITY