COMP 3400 Networks Lecture 9: Selected Network Security Topics
major resource: Computer Networking (4th Edition), Kurose and Ross, Addison Wesley, 2008

[ previous | schedule | next ]

Network Security Intro

Cryptography

Some terminology

Traditional, Symmetric, cryptography methods

Public Key Cryptography

Integrity

Digital Signatures

Combining crytographic hash and digital signature

Playback Attacks

How to obtain/verify secret (symmetric) or public key?

Man-In-The-Middle Attacks


[ COMP 3400 | Peter Sanderson | Math Sciences home page | Otterbein ]

Last updated:
Peter Sanderson (PSanderson@otterbein.edu)