1- Overview
We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book.
SlideshareLecturer
Home TeachingWelcome my students, I hope to enjoy learning our course.
We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book.
SlideshareWe will discuss the following: CCNAS Overview, Threats Landscape, Hackers Tools, Tools.
SlideshareWe will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher.
SlideshareWe will discuss the following: Polyalphabetic Ciphers, Vigenère Cipher, Autokey Cipher, Vernam Cipher, Transposition Techniques, Rail Fence Cipher, Row Transposition Cipher.
SlideshareWe will discuss the following: Classical Security Methods, AAA, Authentication, Authorization, Accounting, AAA Characteristic, Local Based AAA, Server Based AAA, TACACS+ and RADIUS.
SlideshareWe will discuss the following: Stream Ciphers and Block Ciphers, Data Encryption Standard, DES Algorithm, DES Key Creation, DES Encryption, The Strength Of DES.
SlideshareWe will discuss the following: Data Encryption Standard, DES Algorithm, DES Key Creation.
SlideshareWe will discuss the following: Simplified Advanced Encryption Standard, S-AES Encryption and Decryption, S-AES Key Generation, S-AES Encryption, S-AES Decryption.
SlideshareWe will discuss the following: Advanced Encryption Standard, AES Key Expansion, AES Encryption, AES Decryption, DES vs AES, Advantages of AES.
SlideshareWe will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
SlideshareAny Problem send me e-mail to mloey@live.com
Benha University: http://bu.edu.eg/staff/mloey