Cryptology aka Cryptography Tim Cahill Ryan Church
Project Plan Understand both public-key and symmetric cryptography Explore types of functions used: –hash Be able to create cryptographic programs. Learn the significance of key length. –Lower number bits = easier hacking DON’T FAIL!
Project Goals Compare the types of ciphers: –Similarities –Differences Cryptographic systems: –Public key, symmetric-key Purpose: –Security measures –Privacy –Authentication
Main Concepts Cryptology- the science of writing in secret code. Cipher- is an algorithm for performing encryption and decryption. Public-key cryptography- is a method for secret communication between two parties without requiring an initial exchange of secret keys. Symmetric-key algorithms- are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption. Caesar cipher- is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
References Spam and the ongoing battle for the inbox. Communications of the ACM, Volume 50, #2 (2007), pages Joshua Goodman, Gordon V. Cormack, David Heckerman. Textbook: Invitation to computer science java version Edition 3, Schneider, copyright 07. pages An overview of cryptography. Gary C. Kessler, may 1998 (23 January 2009). (website)