CYG Chapter 1 Introduction
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction
Fichier Détails
Cartes-fiches | 15 |
---|---|
Langue | English |
Catégorie | Informatique |
Niveau | Université |
Crée / Actualisé | 21.03.2017 / 13.04.2017 |
Attribution de licence | Non précisé |
Lien de web |
https://card2brain.ch/box/20170321_cyg_chapter_1_introduction
|
Intégrer |
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_1_introduction/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
What is the definition of cryptography?
[definition.introduction]
“Cryptography is the study of mathematical techniques related to aspects of information security.”
What are the forms of information security?
[definition.introduction, 4]
1. Confidentiality
2. Data integrity
3. Entity authentication
4.Data origin authentication
What are the topics of cryptography?
[topics.introduction, 4]
1. Concealing data from eavesdroppers and only available to entitled users
2. Authentication of users and messages
3. Anonymity
4. Protocols for transmission and key management
What was before 1975?
[history.introduction]
Cryptography was mostly developed by the military
What was in the late 1970s?
[history.introduction]
Networks established, leading to growing interest in protecting privacy and confidentiality
What was in 1976?
[history.introduction]
Diffie and Hellman with paper ‘New Directions in Cryptography’
What did the paper ‘New Directions in Cryptography’ introduced?
[diffiehellman.history.introduction]
Public-key technique
By which today’s applications is the technique used?
[diffiehellman.history.introduction, 6]
1. e-banking
2. e-commerce
3. e-cash
4.Automatic debiting
5. Computer access controls
6. Secure communication