Security of information and communication networks, Part 1:

Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility...

Full description

Saved in:
Bibliographic Details
Main Author: Kartalopoulos, Stamatios V. (Author)
Format: Electronic Video
Language:English
Published: United States IEEE 2010
Subjects:
Online Access:FHN01
TUM01
Summary:Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir
Item Description:Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020)
Physical Description:1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations
ISBN:9781424461813

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection!