Professional Documents
Culture Documents
Week 9 Cryptography 1
Week 9 Cryptography 1
Learning Objectives
2) Understand why maintenance of the information security program is needed on an ongoing basis
Agenda 5) Identify the key factors involved in monitoring the external and internal environment
1
INTRODUCTION
The art of war teaches us to rely not on the likelihood of the
enemy's not coming, but on our own readiness to receive him; not
on the chance of his not attacking, but rather on the fact that we
have made our position unassailable.
—The Art of War, Sun Tzu
What is Cryptography in information security?
Integrity: Assuring the receiver that the received message has not been
altered in any way from the original.
Ø Symmetric algorithm
Ø Symmetric Algorithm
Ø Public Key Algorithm
Ø Digital signature
Ø RSA
Ø Elliptic Curve Cryptography (ECC)
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Attacks of cryptography
THANKS…!!!