Module 03 Cryptography MB - HJ
Module 03 Cryptography MB - HJ
aphy
Table of Content
• Threats
• Security Goals
• Encryption & Decryption
• Cryptography
• Types of Cryptography
• Hash Functions
• Ciphers
• Public Key Infrastructure (PKI)
• Attacks on cryptosystems
• Cryptography + Cyber Security
THREATS
A cyber or cybersecurity threat is
a malicious act that seeks to
damage data, steal data, or
disrupt digital life in general.
Cryptography
The public key infrastructure uses a pair of keys: the public key and
the private key to achieve security. The public keys are prone to
attacks and thus an intact infrastructure is needed to maintain them.
Attacks on cryptosystems
Passive Attacks:
Active Attacks: