INSPIRING FUTURES

Security and forensic computing: encryption.

Buchanan, William J (2011) Security and forensic computing: encryption. [Video]

[img] HTML
sfc_unit03.html
Available under License Creative Commons Attribution Non-commercial.

Download (511B)
[img]
Preview
PDF
unit04_encryption.pdf
Available under License Creative Commons Attribution Non-commercial.

Download (7MB)

Abstract/Description

3 ENCRYPTION 90
3.1 Introduction 90
3.2 Simple cipher methods 91
3.3 Encryption operators 94
3.4 Key-based cryptography 96
3.5 Brute-force analysis 103
3.6 Public-key, private-key and session keys 106
3.7 Adding salt 106
3.8 Private-key encryption 108
3.9 Encryption classes 109
3.10 Public-key encryption 114
3.11 One-way hashing 117
3.12 Key entropy 119
3.13 File encryption 120
3.14 Tutorial 120
3.15 Software Tutorial 125
3.16 Web Page Exercises 127
3.17 Network Simulation Tutorial 127

Item Type: Video
Uncontrolled Keywords: Authentication; encrytion; firewall; protocols; HTTP; Telnet; FTP; DNS; POP-3; encoding; decoding; code mapping;
University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
Dewey Decimal Subjects: 000 Computer science, information & general works >
000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Item ID: 4059
Depositing User: Professor Bill Buchanan
Date Deposited: 11 Jan 2011 14:00
Last Modified: 12 Jul 2012 08:26
URI: http://researchrepository.napier.ac.uk/id/eprint/4059

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373