Top Banner
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 27 Network Security
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 27

NetworkSecurity

Page 2: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-1

Aspects of security

Page 3: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-2

Secret key encryption

Page 4: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-3

Public key encryption

Page 5: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-4

Combination

Page 6: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-5

Signing the whole document

Page 7: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-6Signing the digest

Page 8: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-7

Sender site

Page 9: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-8Receiver site

Page 10: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-9

PGP at the sender site

Page 11: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-10

PGP at the receiver site

Page 12: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-11

Access authorization with secret key encryption

Page 13: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-12

Access authorization with public key encryption