Ch 08 kho tài liệu training
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: Ch 08 kho tài liệu training
Ch 08 kho tài liệu training
■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu trainingnt in cryptography•Symmetric and asymmetric key algorithms•Public key infrastructure (PKI) concepts and mechanisms•Hashing algorithms and uses•Types of attacks on cryptosystemsCryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. Ch 08 kho tài liệu training It is considered a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitiCh 08 kho tài liệu training
ve information as it is stored on media or transmitted through untrusted network communication paths.One of the goals of cryptography, and the mechani■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu trainingt algorithms and reveal the encoded information. So a more realistic goal of cryptography is to make obtaining the information loo work-intensive or time-consuming to be worthwhile to the attacker.Ihe first encryption methods date back to 4000 years ago and were considered more of an art form. Encry Ch 08 kho tài liệu trainingption was later adapted as a tool to use in warfare, commerce, government, and other arenas in which secrets needed to be safeguarded. With the relatiCh 08 kho tài liệu training
vely recent birth of the Internet, encryption has gained new prominence as a vital tool in everyday transactions. Throughout history, individuals and ■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu training in complexity; new methods and algorithms have been continually introduced, and encryption has become an integrated part of the computing world.Cryptography has had an interesting history and has undergone many changes down through the centuries. Keeping secrets has proven very important to the wor Ch 08 kho tài liệu trainingkings of civilization. It gives individuals and groups the ability to hide their true intentions, gain a competitive edge, and reduce vulnerability, aCh 08 kho tài liệu training
mong other things.659CISSP All-ĩn-One Exam Guide660The changes that cryptography has undergone closely follow advances in technology. Hie earliest cry■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu trainingns to decipher the messages. Cryptography has come a long way since then. Now it is inserted into streams of binary code that pass over network wires, Internet communication paths, and airwaves.The History of CryptographyLook, I scrambled up the message so no one can read it. Response: Yes, but note Ch 08 kho tài liệu training neither can ire.Cryptography has roots that begin around 2000 B.c. in Egypt, when hieroglyphics were used to decorate tombs to tell the life story- oCh 08 kho tài liệu training
f the deceased. The intention of the practice was not so much about hiding the messages themselves; rather, the hieroglyphics were intended to make th■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu traininginformation from othersA Hebrew cryptographic method required the alphabet to be flipped so each letter in the original alphabet was mapped to a different letter in the flipped, or shifted, alphabet. The encryption method was called albash,which was used to hide the true meaning of messages. An exam Ch 08 kho tài liệu trainingple of an encryption key-used in the atbash encryption scheme is shown next;ABCDEfcXiHl J KLM.NOLX21ÌSTU v wx X zF.VXWVIJT.'iROPONMT.K.TTRGFRDCRAl orCh 08 kho tài liệu training
example, the word 'security* is encrypted into "hvxfirgb.* What does "xrlibk" come out to be?Ibis is an example of a substitution cipher, because each■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu training only one alphabet, whereas a polyalphabetic substitution cipher uses multiple alphabets.NOTE Cipher Is another term for algorithm.cnapier o: cryptograpny661'Illis simplistic encryption method worked for its time and for particular cultures, but eventually more complex mechanisms were required.Aroun Ch 08 kho tài liệu trainingd 400 B.C., the Spartans used a system of encrypting information in which they would write a message on a sheet of papyrus (a type of paper) that wasCh 08 kho tài liệu training
wrapped around a staff (a slick or wooden rod), which was then delivered and wrapped around a different staff by the recipient. I he message was only ■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen Ch 08 kho tài liệu training scyUile cipher, when the papyrus was not wrapped around the staff, the writing appeared as just a bunch of random characters.Liter, in Rome, Julius Caesar (100-44 B.c.) developed a simple method of shifting letters of the alphabet, similar to the albash scheme. He simply shifted the alphabet by thr Ch 08 kho tài liệu trainingee positions. The following example shows a standard alphabet and a shifted alphabet. rhe alphabet serves as the algorithm, and the key is the numberCh 08 kho tài liệu training
of locations it has been shifted during the encryption and decryption process.■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemen■CryptographyCHAPTERThis chapter presents the following:•History of cryptography•Cryptography components and their relationships•Government involvemenGọi ngay
Chat zalo
Facebook