Summary


Recap

  • Using Public Key Infrastructure (PKI), anyone can send a confidential message using public information, which can only be decrypted with a private key in the sole possession of the intended recipient.

  • RSA encryption is widely used and is a 'de-facto' encryption standard.

  • The MD 5 algorithm is intended for digital signature applications , where a large file must be compressed securely before being encrypted

  • SHA algorithm takes as input a message of arbitrary length and produces as output a 160-bit message digest of the input.

  • Secure Sockets Layer, SSL is a protocol for transmitting private documents via the Internet. RC5 is a fast block cipher designed by RSA Security.

  • SSH (Secure Shell) is a secure replacement for telnet and the Berkeley r-utilities and this provides an encrypted channel for logging into another computer over a network, executing commands on a remote computer, and moving files from one computer to another. [1]

[1] (Reference: Cryptography FAQs published on the World Wide Web)




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net