본문 바로가기

security_downloads

암호화의 개요

728x90

An Overview of Cryptography

Gary C. Kessler
9 March 2014

© 1998-2014 — A much shorter, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks,
published by Auerbach in September 1998. Since that time, this paper has taken on a life of its own...



CONTENTS

 

FIGURES

  1. Three types of cryptography: secret-key, public key, and hash function.
  2. Sample application of the three cryptographic techniques for secure communication.
  3. Kerberos architecture.
  4. GTE Cybertrust Global Root-issued certificate (Netscape Navigator).
  5. Sample entries in Unix/Linux password files.
  6. DES enciphering algorithm.
  7. A PGP signed message.
  8. A PGP encrypted message.
  9. The decrypted message.
  10. IPsec Authentication Header format.
  11. IPsec Encapsulating Security Payload format.
  12. IPsec tunnel and transport modes for AH.
  13. IPsec tunnel and transport modes for ESP.
  14. Keyed-hash MAC operation.
  15. Browser encryption configuration screen (Firefox).
  16. SSL/TLS protocol handshake.
  17. Elliptic curve addition.
  18. AES pseudocode.
  19. TrueCrypt screen shot (Windows).
  20. TrueCrypt screen shot (MacOS).
  21. TrueCrypt hidden encrypted volume within an encrypted volume.
  22. EFS and Windows Explorer.
  23. The cipher command.
  24. EFS key storage.
  25. The $LOGGED_UTILITY_STREAM Attribute.

TABLES

  1. Minimum Key Lengths for Symmetric Ciphers.
  2. Contents of an X.509 V3 Certificate.
  3. Other Crypto Algorithms and Systems of Note.
  4. ECC and RSA Key Comparison.
자세한 사이트 http://www.garykessler.net/library/crypto.html



728x90