UC Irvine,
Information and Computer Science Department
Winter 2000
ICS 54:
Brief Notes on Encryption and Security
The Greatest Threat to Network Security is Human Care-less-ness.
Functions of Encryption
- Confidentiality
- Authentication
- Integrity
- Nonrepudiation
References:
-
TechWeb: Cryptography
-
(Secret Key vs Public Key
Picture):
Secret-Single-Symmetric vs. PublicPrivatePair-Asymmetric
Digital Certificate and Certificate Authorities (CA).
Message Digest
Digital Signature
(Picture)
Diffie-Hellman
RSA
-
ZDNet Webopedia: Security
-
Authentication,
Authorization,
Cryptography,
Encryption,
Firewall,
Kerberos,
RSA,
Sniffer.
Also,
Digital
Certificate,
Certificate Authority,
Digital
Signature,
Public
Key Encryption.
- History of Public-Key Cryptography
-
New York Times Coverage of Encryption
- References on Cryptography
-
- Organizations
-
- Web Security:
A Matter of Trust,
- World Wide Web Journal:
Volume 2, Issue 3, 1997.
Available in print from
O'Reilly,
ISBN 1-56592-329-4.
- W3C Security Resources
- The
WWW Security FAQ
- Practical UNIX
& Internet Security, 2nd Edition,
- by Simson Garfinkel and Gene Spafford, O'Reilly, 1996,
ISBN 1-56592-148-8.
- Matt Bishop
(UC Davis Computer Science)
Comments are welcome.
Current as of 6 March 2000
HTML
4.01 Checked.