Slide 1 Chapter 8 Network Security Principles, Symmetric Key Cryptography, Public Key Cryptography Professor Rick Han University of Colorado at Boulder [email protected]…
Slide 1 Security Slide 2 2 Security in the real world Security decisions based on: –Value, Locks, Police Some observations: –Not all locks are the same –People pay…
Chapter 5 Electronic mail security Outline Pretty good privacy S/MIME Recommended web sites Secure e-mail Alice: generates random symmetric private key, KS. encrypts message…
Chapter 2 The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmet- ric or secret key cryptography and asymmetric…