235034 Security in Computer Systems and Networks Cryptography
- Slides: 55
235034 Security in Computer Systems and Networks Cryptography Application Lec. Sanchai Yeewiyom School of Information and Communication Technology 1
การประยกตใชการเขารหสขอมล ¨ Authentication ¨ Mail Security ¨ Web Security ¨ Remote Login Security ¨ Network Security 2/55
11/55
14/55
Mail Security การรบสง e-Mail โดย SMTP, POP 3, IMAP จะไมมการ เขารหส เปนหนาทของผใชทตองหาวธการเข ารหส เชน ¨ PGP )Pretty Good Privacy( ¨ S/MIME) Secure/Multipurpose Internet Mail Extensions( 15/55
Asymmetric Key Cryptography
Asymmetric Key Cryptography
19/55
20/55
S/MIME ¨ Secure/Multipurpose Internet Mail Extensions ¨ Public Key Encryption ¨ พฒนาโดย RSA Data Security Inc. เมอป 1995 จากนนถกพฒนาตอโดย IETF (Internet Engineering Task Force) ในป 2002 ¨ เปนมาตรฐานอตสาหกรรมในการเขารหส Client e. Mail ¨ Integrate เขาไปกบโปรแกรม e-Mail เชน Outlook, Outlook Express, Lotus Notes, Mozilla Mail, i. Cloud 21/55
SSL/TLS บรการของ SSL ¨ Server Authentication ¨ Client Authentication ¨ Encrypted Session (Symmetric Encryption) 28/55
Network Security ¨ เปนการเขารหสในสวนของ Lower Layer ของ OSI Virtual Private Network (VPN) ซงมโพรโตคอล ชวยจดการให ¨ Exp. VPN • PPTP )Point-to-Point Tunneling Protocol( • L 2 F )Layer 2 Forwarding( • L 2 TP )Layer 2 Tunneling Protocol( • IPSec )IP Security( 34/55
VPN 37/55
การทำงานของ VPN ¨ Authentication VPN ¨ Encryption ¨ Tunneling ¨ Firewall 38/55
รปแบบโพรโตคอลของการทำ Tunnel ¨ PPTP (Point -to -Point Tunneling Protocol) ¨ L 2 F (Layer 2 Forwarding protocol) ¨ L 2 TP )Layer 2 Tunneling Protocol) ¨ IPSec )IP Security) 44/55
Encapsulated Security Payload : ESP ¨ Security Parameter Index )SPI (กำหนด Security Association )SA (ระบ ESP ทสอดคลองกน 54/55
- Wireless security in cryptography and network security
- Cryptography in computer networks
- Virtual circuit vs datagram networks
- Backbone networks in computer networks
- Network vs distributed system
- Private secuirty
- Cryptography and network security 6th edition
- криптографический модуль
- Number theory in cyber security
- Firewall in cryptography and network security
- Authentication in cryptography and network security
- Three classes of intruders in network security
- Security services of cryptography
- Primitive root in cryptography
- Cryptography and network security 6th edition pdf
- Cryptography and network security 7th edition
- Source
- Cryptography and network security 4th edition
- Fermat's theorem in cryptography and network security
- Finite fields in cryptography and network security
- Dsa in network security
- Gcd(1970,1066)
- Pgp in cryptography and network security
- Euler's theorem in cryptography and network security
- Malicious software in cryptography
- Introduction to cryptography and network security
- Rsa algorithm in cryptography and network security
- Introduction to cryptography and network security
- Cryptography security services
- Pigpen
- Cryptography computer science
- Iec 61850 communication networks and systems in substations
- Auditing networks perimeters and systems
- Integrated and differentiated services in computer networks
- Checksum in computer networks with example
- Byte stuffing example
- Bit stuffing vs byte stuffing
- Arp and rarp in computer networks
- Analog and digital signals in computer networking
- Http computer networks
- Computer networks and internets with internet applications
- Hamming distance in computer network
- Protocols and standards in computer networks
- Crc example
- Computer networks and internets
- Next generation security platform
- Pearson vue pcnse
- Palo alto networks next generation security platform
- Palo alto networks next generation security platform
- Overlay networks in distributed systems
- Interconnection networks in multiprocessor systems
- Security policy and integrated security in e-commerce
- Crc in computer networks
- Crc in computer networks
- Traffic management in computer networks
- Tanenbaum