nformation Security 05 Message authentication and hash function Chapter 1 1 復大软件学院
1 Information Security 05 Message authentication and Hash function Chapter 11
Review Symmetric Cryptography Asymmetric Cryptography 復大软件学院
2 Review • Symmetric Cryptography • Asymmetric Cryptography
wo Review: Symmetric Model Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e.g, DES) (reverse of encryption algorithm) Bob Alice 3 復大软件学院 LiT
LiJT 3 Review: Symmetric Model Bob Alice
Asymmetric Model Bobs public key rIng Oy STed Mike Alice Alice's public Alice 's private e ke Transmitted ciphertext Plaintext Plaintext Encryption algorithm Decryption algorithm (e. g, RSA) (reverse of encryption algorithm Bob Alice 復大软件学院 LiT
LiJT 4 Asymmetric Model Bob Alice
Review Confidentiality 復大软件学院
5 Review • Confidentiality