ch27

13
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 27 Network Security

Upload: idris-usmani

Post on 24-Dec-2014

129 views

Category:

Technology


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 27

NetworkSecurity

Page 2: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-1

Aspects of security

Page 3: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-2

Secret key encryption

Page 4: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-3

Public key encryption

Page 5: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-4

Combination

Page 6: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-5

Signing the whole document

Page 7: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-6Signing the digest

Page 8: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-7

Sender site

Page 9: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-8Receiver site

Page 10: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-9

PGP at the sender site

Page 11: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 27-10

PGP at the receiver site

Page 12: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-11

Access authorization with secret key encryption

Page 13: Ch27

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 25-12

Access authorization with public key encryption