Security of information and communication networks, Part 1:

Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kartalopoulos, Stamatios V. (VerfasserIn)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: United States IEEE 2010
Schlagworte:
Online-Zugang:FHN01
TUM01
Zusammenfassung:Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir
Beschreibung:Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020)
Beschreibung:1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations
ISBN:9781424461813

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!