Computer Networking Lecture Notes

2013 September 19 • Application Security


Outline

Application Security

Security Attacks

Protection Mechanisms

Cryptography

Cypher Example

Cryptographic Security

Breaking Cryptography

Symmetric-Key Cryptography

Asymmetric-Key Cryptography

Cryptographic Techniques

Problem Solved?

Authentication

Asymmetric-Key Authentication

Attack!

Verifying Identity

Identity Verification

Digital Certificates

SSH Example

SSH Transport

Server Authentication

SSH Connections

Summary


This page last modified on 2012 September 20.

Creative
    Commons License