CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
Conventional Encryption: Algorithms
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
What is Elliptic Curve Cryptography?
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Announcements: HW4 – DES due midnight HW4 – DES due midnight So far the record is less than 15 sec on 1 million iters Quiz on ch 3 postponed until after.
Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
Announcements: How was last Saturday’s workshop? How was last Saturday’s workshop? DES due now DES due now Chapter 3 Exam tomorrow Chapter 3 Exam tomorrow.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
CSC 386 – Computer Security Scott Heggen. Database Security How can we minimize the probability of success by attacks like the one shown in the comic?
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
CSC 111 – Storytelling through Computer Animation Scott Heggen.
Computer Security coursework 2 Dr Alexei Vernitski.
Computer encryption is… Based on the science of cryptography.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography By, Anthony Lonigro & Valentine Mbah.
CSC 386 – Computer Security Scott Heggen. Agenda Do not wait for me; begin working right away Complete the following tasks in your code: Implement the.
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Darci Miyashiro Math 480 April 29, 2013
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Encryption.
East High School Math Week Jeff Kinne UW Computer Science.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Traditional Symmetric-Key Ciphers
Introduction to Quantum Key Distribution
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
MAT 1000 Mathematics in Today's World Winter 2015.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Encryption CS110: Computer Science and the Internet.
CSE 311 Foundations of Computing I Lecture 10 Set Theory Autumn 2012 Autumn 2012CSE
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
CS 150 – Computing: From Ada to the Web Cryptography.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Computer Security coursework 3 Dr Alexei Vernitski.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
M3: Encryption r By Andrew Stringer.
NET 311D Information Security
Presentation transcript:

CSC 386 – Computer Security Scott Heggen

Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Last Week’s Homework Bell-LaPadula Model Deadline extended until 11:55pm today

Cryptography Primer AliceBob m Eve

Cryptography Primer AliceBob Eve k k m E C = E(k,m) m D

Symmetric Key Both Alice and Bob’s key are the same Must be shared prior to communications What is the key?

Substitution Cipher (Caesar Cipher) AC BE CF DG EH FI GJ …… k = AliceBob Eve k k “bad egg” E C = E(k,m) = “egc hjj” “bad egg” D “egc hjj”

Assignment For Friday: Create a Python script which takes in two files: message.txt and key.txt The message.txt file can contain any message you chose to send me The key.txt file must contain your B-number, without the letter B The Python script must compute C using the message and the key. Your encryption algorithm E should be a simple substitution cipher which shifts each letter of message by the integer value in key. Submit to Moodle: Your Python Script coded_message.txt