Recently announced is an Expert Now tutorial on Security of Information and Communication Networks.
In this tutorial we provide an Introduction and a quick Historical Perspective on Information security. Next we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Devisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir.
In this tutorial we provide a simplified description of Quantum Cryptography (QC), the qubit, the superposition of states, and the polarization of photons, the quantum key distribution (QKD), the BB84 and B92 protocols, the K05 enhanced protocol, the generation of entangled photons and the teleportation phenomenon, and the vulnerabilities of realistic quantum networks. We continue with Chaotic processes and Chaos Cryptography, and we introduce Chaotic Quantum Cryptography. We describe biometrics in communications as part of security and privacy, and we finish up with security of the next generation optical network in which we introduce and describe methods for intrusion detection, countermeasure strategies and also autonomous network counterattack scenarios.
No comments:
Post a Comment