• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko, Chapter 3 Cryptography

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 2b - Cryptography Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:54 am

    Introduction to Cryptography: An overview of the history, importance, and applications of cryptography. Cryptography is used to protect the confidentiality, integrity, and authenticity of data, and it is essential for secure communications over the Internet, financial transactions, and many other areas.
    Basic principles of cryptography: Introduces the basic principles of cryptography, including ciphertext and plaintext, encryption and decryption, key and algorithm. It also covers the difference between symmetric and asymmetric encryption.
    Symmetric encryption: This section details symmetric encryption algorithms, where the same key is used for encryption and decryption. Common symmetric encryption algorithms include Advanced encryption Standard (AES), Data encryption Standard (DES), and 3DES.
    Asymmetric encryption: Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This type of cryptography allows for secure communication between parties that have not previously exchanged keys. RSA and ElGamal are examples of asymmetric encryption algorithms.
    Hash function: This chapter explains the hash function, which is a cryptographic algorithm that takes an input of arbitrary size and produces an output of fixed size, called a hash value. Hash functions are used for data integrity verification, password storage, and digital signatures.
    Digital signature: A digital signature is a way to verify the authenticity and integrity of a message. They use asymmetric encryption and hash functions to provide non-repudiation, meaning that the sender cannot falsely claim that they did not send the message.
    Public Key infrastructure (PKI): This chapter discusses PKI, which is a system for managing public key distribution and facilitating the use of public key encryption. PKI includes certificate authorities that issue digital certificates that bind public keys to entities.
    Cryptographic attacks: The authors provide an overview of common cryptographic attacks, such as brute-force attacks, frequency analysis, and selective plaintext attacks, and discuss ways to prevent or mitigate these attacks.
    Cryptographic standards and guidelines: This chapter concludes with a discussion of cryptographic standards and guidelines, such as those issued by the National Institute of Standards and Technology (NIST) and other standards bodies.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 12:41 pm

    It is of vital importance to apply cryptography in ensuring secure communication and data storage. It covers various cryptographic principles, including the distinction between symmetric and asymmetric cryptography, the significance of encryption and decryption keys, and the role of cryptographic algorithms. This part discusses the application of these principles in real-world scenarios, emphasizing the necessity of cryptography in protecting sensitive information from unauthorized access and ensuring the integrity and confidentiality of data.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in