mcgraw-hill©the mcgraw-hill companies, inc., 2003 chapter 19 data encryption

20
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption

Upload: jonah-webster

Post on 02-Jan-2016

220 views

Category:

Documents


1 download

TRANSCRIPT

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Chapter 19

DataEncryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Figure 19-1

Concept of Encryption and Decryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Encryption/Decryption Methods

Figure 19-2

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Monoalphabetic Substitution

Figure 19-3

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Polyalphabetic Substitution

Figure 19-4

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Transpositional Encryption

Figure 19-

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Encoding/DecodingFigure 19-6

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Permutation

Figure 19-7

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

SubstitutionFigure 19-8

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

ProductFigure 19-9

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Exclusive ORFigure 19-10

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Rotation

Figure 19-11

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

DESFigure 19-12

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Subkey Generation in DESFigure 19-13

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

One of the 16Steps in DES

Figure 19-14

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Public Key EncryptionFigure 19-15

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

RSAFigure 19-16

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

RSA Encryption and Decryption

Figure 19-17

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Security of RSA

Figure 19-18

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2003

Signature AuthenticationFigure 19-19