Cryptography and Network Security
Cryptography and Network Security
Chapter 1
Introduction
Background
Information Security requirements have changed in
recent times
CERT:
Computer
Emergency
Response Team
RFC 2828:
“a processing or communication service provided by a system
to give a specific kind of protection to system resources”
X.800 standard
security attacks, services, mechanisms
models for network (access) security
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
2. if both letters fall in the same row, replace each with letter
to right(wrapping back to start from end)
3. if both letters fall in the same column, replace each with the
letter below it (again wrapping to top from bottom)