Annotated Bibliography On Encryption And Cryptography

3972 WordsAug 3, 201516 Pages
Contents 1 Cryptography 2 Introduction 2 Methods of encryption or cryptography. 2 Symmetric 2 Asymmetric 2 Operation and Working of Both Methods 3 Ingredients of symmetric encryption 3 Working of symmetric cryptography (Graphical Representation) 4 Ingredients of Asymmetric cryptography 4 Working principal of Asymmetric encryption (Graphical representation) 5 Strengths and Weaknesses of Both 6 Strength of Symmetric Encryption 6 Strength of Asymmetric Encryption 6 Weakness of symmetric encryption 6 Weakness of Asymmetric Cryptography 6 Use of Symmetric and Asymmetric cryptography in IT sector 7 2. VPN and Cryptography in VPN 7 Types of VPN 8 Site-To-Site VPN 9 Remote Access VPN 9 3. Authentication of Users in Windows Environment 10 Integrated Windows Authentication 10 Basic Authentication 10 Digest Authentication 11 4. Kerberos Protocol 11 Kerberos V5 Protocol Standard 12 Encryptions used by the Kerberos v5 protocol 12 Helping Hands (web references) 13 1 Cryptography Introduction The concept of securing the messages through cryptography has a long history. The word cryptography stems from the two Greek words “crypto” and “grafein” meaning “hidden” and “write” respectively. Julius Caesar is credited with creating one of the earliest methods of cryptography system to send the message to his generals. Cryptography simply means to encrypt your message into something else so that nobody can read it that is not authorised to read the information. Only that person can
Open Document