DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Course Syllabus Development Abdullateef Haidar. Contents Introduction Introduction Some considerations Some considerations Components of course syllabus.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Math Xa Introduction to Functions and Calculus Fall 2008 Introductory Meeting John Hall.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Event driven software.
Introduction to Financial Management. Overview of Financial Management Introduction Keys to Success Stay up in class (complete assignments on time each.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
CSSE463: Image Recognition Matt Boutell F-224 x8534
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Andy’s Basic Crypto Course (ABC) Part 1 - Introduction.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
ELC/BUS/PSA 347 Day 1. Agenda Roll Call Introduction WebCT Overview Contract on Classroom Behavior Syllabus Review.
TC 310 The Computer in Technical Communication Dr. Jennifer Turns Week 4, Day 1 (4/21)
James Tam Introduction To CPSC 219 James Tam Administrative (James Tam) Contact Information -Office: ICT 707 -
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
CSSE221: Fundamentals of Software Development Honors Matt Boutell Olin 169 Don’t plug in your laptop just yet… And think of something memorable about yourself.
CSSE221: Software Dev. Honors Day 2 Announcements Announcements Homework due now Homework due now Any problems committing JavaEyes to Subversion? Any problems.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
1. Introduction Fundamental English Writing Skills Dr. Hsin-Hsin Cindy Lee.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Math 115a– Section 4  Instructor: Kerima Ratnayaka   Phone :  Office : MTL 124B.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecturer: Miljen Matijašević G10, room 6, Tue 11:30-12:30 Session 1, 17 Mar 2014.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
COMP 350: Computer Graphics Highlights of class policies (A rare use of PowerPoint)
Back to School Night Mrs. Carpenter’s 6 th Grade Class (Composition and Literature)
COMP 111 Programming Languages 1 First Day. Course COMP111 Dr. Abdul-Hameed Assawadi Office: Room AS15 – No. 2 Tel: Ext. ??
Welcome to Psych 150b Organizational Psychology (a.k.a. Organizational Behavior) Prof. Steven B. Wolff Fall 2006.
Course Introduction CSCI Software Engineering II Fall 2014 Bill Pine.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
WELCOME TO MRS. COHEN’S FIFTH GRADE CLASS 2015 – 2016.
Teaching with Technology (part 1) Workshop 2 Spring 2014.
Computer Security coursework 2 Dr Alexei Vernitski.
Understanding the Academic Structure of the US Classroom: Syllabus.
Network Security Section 1: Introduction to security.
CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Today’s Agenda  Syllabus CS6359: Object-Oriented Analysis and Design.
Course Overhead. 1.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 9 th Edition, Jan 12, 2012.
Integrating Web-based Blackboard™ into ESL Discussion and Writing Activities Presenter: Professor Lyra Riabov Southern New Hampshire University Presentation.
Today’s Agenda  Syllabus  Software Engineering Research.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Welcome!. Class agenda: Introductions Syllabus review Class structure Centering exercise Classroom norms Reflecting about technology Break Introduction.
CSSE463: Image Recognition Matt Boutell Myers240C x8534
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Event driven software.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Graphical-user interfaces.
CIS101 Introduction to Computing Week 01. Agenda What is CIS101? Class Introductions Using your Pace Introduction to Blackboard and online learning.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Oral English I Jason Downs Week 4. Let’s Introduce Ourselves  Teacher Introduction  Ask me anything!  Student Introduction with Partner  Student Introduction.
Introduction to Financial Management. Overview of Financial Management Introduction Keys to Success Recitations Class Structure - Syllabus Text – Financial.
Classroom Expectations Lab Orientation EDUC w200 Fall 2008.
GLOBAL MARKETING MANAGEMENT INTRODUCTION. WELCOME I am Hudson Rogers and I will be the instructor for this course. Over the next few weeks we will explore.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
SCIENCE 7E An Integrated Scientific Classroom Mr. Craig Cohen.
IT 244 Week 7 Access Control Cryptography To purchase this material link 244-Week-7-Access-Control-Cryptography.
English for Academic Purposes
Course Introduction Yuzhe Tang.
CSSE463: Image Recognition
CSSE463: Image Recognition
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Presentation transcript:

DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or not you are in the right classroom…)

CSSE/MA479: Introduction to Cryptography Matt Boutell F-203 x8534

Agenda: Introductions to… The players The topic The course structure The course material

Introductions Roll call: Pronunciations and nicknames Pronunciations and nicknames Help me learn your names quickly Help me learn your names quickly You’ll share with classmates on discussion forum You’ll share with classmates on discussion forumMe: Second year at Rose Second year at Rose Taught CSSE120 (x3), 221, 230 (x4), Image Rec. (x2) Taught CSSE120 (x3), 221, 230 (x4), Image Rec. (x2) First time teaching Crypto! First time teaching Crypto! Some personal stuff... and some saved for later Some personal stuff... and some saved for later

What is Cryptography? Trappe and Washington, p. 3) Designing systems to communicate over non-secure channels

Non-secure channels AliceBob Eve EncryptDecrypt (Trappe and Washington, p. 3) Encryption Key (+1) Decryption Key (-1) plaintextCIPHERTEXT DSZQUPHSBQIZ cryptographycryptography

Agenda The players The topic The course structure The course material

What will we do? Learn theory (lecture, text, written problems) Make and break codes (programming assignments) Research something new (term project)

Angel Syllabus Text: highly recommended by students Text: highly recommended by students Grading, attendance, academic integrity Grading, attendance, academic integritySchedule Contains links to homeworks (first due Monday) Contains links to homeworks (first due Monday) Sign up for the 2 discussion forums Subscribe, then set up your mail to fwd to your Rose acct. Subscribe, then set up your mail to fwd to your Rose acct.

Agenda The players The topic The course structure The course material

Sherlock Holmes, The Adventure of the Dancing Men (1898) In a letter: 2 weeks later: 2 mornings later: 3 days later: 4 days later:

Sherlock Holmes, The Adventure of the Dancing Men (1898) Holmes’ letter:

Comments A simple substitution cipher Used knowledge of linguistics Issue of authentication: Sherlock masqueraded as Elsie. Sherlock masqueraded as Elsie.