Chuck Frank Northern Kentucky University

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Algorithms, Digital Signatures, and Pragmatics
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Coding Theory. p2. Why encode data? Three reasons to encode data that is about to be transmitted(through space) or stored(in a computer): 1. For efficiency.
Midterm Review Cryptography & Network Security
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Computer and Network Security - Message Digests, Kerberos, PKI –
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
A Summary in Fifteen Minutes mas y menos
RSA Laboratories’ PKCS Series - a Tutorial
Asymmetric Encryption
RSA Slides by Kent Seamons and Tim van der Horst
Opracowanie językowe dr inż. J. Jarnicki
Chuck Frank Northern Kentucky University
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Cryptography Why Cryptography Symmetric Encryption
Network Security.
Public-Key Cryptography and RSA
Public-key Cryptography
Chapter 8 Network Security.
Public Key Encryption and the RSA Algorithm
Big Numbers: Mathematics and Internet Commerce
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Computer Security Modular Arithmetic November 12, 2018
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Cryptography and Computer Security for Undergraduates
CAS CS 538 Cryptography.
Chapter 8 Network Security.
Introduction to the course
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Analysis of the RSA Encryption Algorithm
Cryptography: Basics (2)
Intro to Cryptography Some slides have been taken from:
Appendix 5: Cryptography p
Section 2: Cryptography
Cryptography Reference: Network Security
CSE 321 Discrete Structures
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Cybersecurity and Data Encryption
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Unit 2: Cryptography & Cryptographic Algorithm
Asymmetric Cryptographic Algorithms
Cryptology Design Fundamentals
Network Security Chapter 8.
SHA: Secure Hash Algorithm
Cryptology Design Fundamentals
Cryptography Fundamentals
Diffie-Hellman Algorithm
Overview and Introduction (Lecture Contents Summary)
Presentation transcript:

Chuck Frank Northern Kentucky University Applied Cryptography Chuck Frank Northern Kentucky University

CSC 382/682 Cryptography & Computer Security CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course

Why Cryptography? Powerful tool for keeping data and communications secure Cryptography properly applied lessen security threats.

Goals Students should be able to apply cryptography in the software they will develop. Students should be able to apply cryptography in the systems they will manage.

Incorporating Cryptography into Programs Reference: Garns & Somerfield, Professional Java Security, Wrox Press Java Cryptography Extension (JCE)

Java Cryptography Look at a variety of Java cryptography applications Assign several small Java programs including a network application

Incorporating Cryptography into Computer Systems Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall

Knowledge of Modern Cryptography Secret Key Cryptography Public Key Cryptography Hashing and Message Digests Protocols

Secret Key Cryptography What is it? Basic understanding of algorithms DES Triple-DES Rijndael

Public Key Cryptography What is it? Algorithms RSA Diffie Hellman

Hashes and Message Digest Why is useful? Basic understanding of algorithms MD5 SHA-1 Tripwire

Protocols SSL/TSL IPSec Used for e-commerce Public key for key exchange Secret key for encryption IPSec Use for VPNs

Mathematical Background Student have had 10 hours of calculus & discrete math Cover sufficient number theory Modular arithmetic & Euler’s theorem To understand RSA Generation of probable primes

Not Covered Classical, yet obsolete, ciphers History of cryptography Caesar, Vigenére History of cryptography