Partenaire Premium

CYG Chapter 1 Introduction

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction


Fichier Détails

Cartes-fiches 15
Langue English
Catégorie Informatique
Niveau Université
Crée / Actualisé 21.03.2017 / 13.04.2017
Attribution de licence Non précisé
Lien de web
https://card2brain.ch/box/20170321_cyg_chapter_1_introduction
Intégrer
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_1_introduction/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

What is the definition of cryptography?

[definition.introduction]

Cryptography is the study of mathematical techniques related to aspects of information security.”

What are the forms of information security?

[definition.introduction, 4]

1. Confidentiality

2. Data integrity

3. Entity authentication

4.Data origin authentication

What are the topics of cryptography?

[topics.introduction, 4]

1. Concealing data from eavesdroppers and only available to entitled users

2. Authentication of users and messages

3. Anonymity

4. Protocols for transmission and key management

What was before 1975?

[history.introduction]

Cryptography was mostly developed by the military

What was in the late 1970s?

[history.introduction]

Networks established, leading to growing interest in protecting privacy and confidentiality

What was in 1976?

[history.introduction]

Diffie and Hellman with paper ‘New Directions in Cryptography’

What did the paper ‘New Directions in Cryptography’ introduced?

[diffiehellman.history.introduction]

Public-key technique

By which today’s applications is the technique used?

[diffiehellman.history.introduction, 6]

1. e-banking

2. e-commerce

3. e-cash

4.Automatic debiting

5. Computer access controls

6. Secure communication