Skip to main content

Research Repository

Advanced Search

Security and forensic computing: encryption.

Buchanan, William J

Authors



Abstract

3 ENCRYPTION 90
3.1 Introduction 90
3.2 Simple cipher methods 91
3.3 Encryption operators 94
3.4 Key-based cryptography 96
3.5 Brute-force analysis 103
3.6 Public-key, private-key and session keys 106
3.7 Adding salt 106
3.8 Private-key encryption 108
3.9 Encryption classes 109
3.10 Public-key encryption 114
3.11 One-way hashing 117
3.12 Key entropy 119
3.13 File encryption 120
3.14 Tutorial 120
3.15 Software Tutorial 125
3.16 Web Page Exercises 127
3.17 Network Simulation Tutorial 127

Publication Date 2011
Deposit Date Jan 11, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Authentication; encrytion; firewall; protocols; HTTP; Telnet; FTP; DNS; POP-3; encoding; decoding; code mapping;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4059
Contract Date Jan 11, 2011

Files






You might also like



Downloadable Citations