Download - Ch27
![Page 1: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/1.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 27
NetworkSecurity
![Page 2: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/2.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-1
Aspects of security
![Page 3: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/3.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-2
Secret key encryption
![Page 4: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/4.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-3
Public key encryption
![Page 5: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/5.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-4
Combination
![Page 6: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/6.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-5
Signing the whole document
![Page 7: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/7.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-6Signing the digest
![Page 8: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/8.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-7
Sender site
![Page 9: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/9.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-8Receiver site
![Page 10: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/10.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-9
PGP at the sender site
![Page 11: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/11.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 27-10
PGP at the receiver site
![Page 12: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/12.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 25-11
Access authorization with secret key encryption
![Page 13: Ch27](https://reader035.vdocuments.us/reader035/viewer/2022062616/549a3aa6b479593f468b45b8/html5/thumbnails/13.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 25-12
Access authorization with public key encryption