Escolar Documentos
Profissional Documentos
Cultura Documentos
Internet
denial of services.
Masqueraders
Threat
organization.
People
computer network.
CYBER ATTACKS
Executable based or Network based attacks.
Trojan
Virus
Worm
Spam
Confidentiality
Integrity
Authenticity
Non-Repudiability
CRYPTOGRAPHY-BASED SOLUTIONS
CRYPTOSYSTEMS
Symmetric Cryptosystems
Began in 1977.
Work in single key or secret key shared between two
communicating parties.
DOCUME
NT
SENDE
R
ENCODE
D
DOCUME
DES
NT
ENCRYPTION
ENCODE
D
DOCUME
NT
SYMMETRIC KEYS
DOCUME
NT
DES
DECRYPTION
RECEIVE
R
ASYMMETRIC CRYPTOSYSTEMS
1.
2.
Message
ENCRYPTION
SENDER
A
(PKA,SKA
)
PKB
Ciphertex
t
DECRYPTION
Message
RECEIV
ER
(PKB,SK
B)
SKB
Message
SIGNING
SKA
Message
Signatur
e
VERIFICATIO
N
Signature
valid
PKA
Digital Signatures
2.