Basic HTML version of Foils prepared Dec. 6 98

Foil 15 Network Security (2)

From Introduction to Network Management Lectures at Xi'an Jaotong University -- Sept 1998. by Roman Markowski


1 Protection components:
  • Confidentiality - hiding data to all but the intended viewers typically involves encryption, where data are scrambled and unscrambled using some common algorithm (DES, RC4, RC5, IDEA) and common cryptographic keys
  • Integrity - keeping information unchanged by applying tools to detect any alterations (algorithms: MD5, SHA)- they use strong cryptographic data checksums generated at the source, sent with data and checked at the destination
  • Authentication - identifying of the origin of information (typically associated with logon procedures). Public key technologies (RSA, DSA) are used to create digital signatures
  • Authorization - providing authenticated users with access services through access rights

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Dec 6 1998