Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography and Information Security

Similar presentations


Presentation on theme: "Cryptography and Information Security"— Presentation transcript:

1 Cryptography and Information Security
5/29/2018 CS480 Cryptography and Information Security Midterm Review Huiping Guo Department of Computer Science California State University, Los Angeles

2 Midterm Saturday, 02/13, 6:00 --- 8:30pm Closed book and closed notes
Location: ASCB 132 Closed book and closed notes Calculators are allowed You may need bring your own scratch paper Cell phones are NOT allowed Mid review CS480_W16

3 Math Euclidean algorithm and Extended Euclidean algorithm
How to use Euclidean algorithm to find the gcd of two integers How to use Extended Euclidean algorithm to find the multiplicative inverse of an integer modulo another integer How to use Extended Euclidean algorithm to find the multiplicative inverse of a polynomial modulo another polynomial Mid review CS480_W16

4 Math Modular arithmetic Modular Operator Congruence Inverses
Additive inverse Multiplicative inverse How to know whether an integer b has a multiplicative inverse in Zn ? Operations in Zn Operations in Zn* Mid review CS480_W16

5 Traditional Symmetric Key Ciphers
Kerckhoff’s Principle Why this principle? Substitution ciphers Generally, how it works? Monoalphabetic Substitution Additive cipher Multiplicative cipher Affine cipher Polyalphabetic Substitution AutoKey Playfair Mid review CS480_W16

6 Traditional Symmetric Key Ciphers
Single-Variable Linear Equations How to solve ax ≡ b (mod n )? Transposition cipher Generally, how it works? Rail fence cipher Stream ciphers vs block ciphers Mid review CS480_W16

7 Modern Symmetric-Key Ciphers
Modern block ciphers Confusion and diffusion Components of block ciphers P-boxes , S-boxes, … Product ciphers Feistel and non-Feistel ciphers Stream ciphers Linear feedback shift registers for implementing stream ciphers Mid review CS480_W16

8 DES Basic structure of DES Building elements of DES
Input, output and key Building elements of DES The DES function S-box and P-box The round keys generation process Multiple DES Why multiple DES? Mid review CS480_W16

9 Algebraic Structures Groups vs. Rings vs. Fields
Order of a group and subgroups Lagrange’s Theorem Order of an element Galois field How to decide whether a field is a Galois field? Some commonly used Galois field Polynomial Why polynomial? How to use a polynomial to represent a n-bit word Operations on polynomial How to find the inverse of an polynomial Mid review CS480_W16

10 Algebraic Structures Generator
What is a generator? Why generator? Define the elements in a GF field using a generator How to do multiplication, division, inverses for polynomials? Mid review CS480_W16


Download ppt "Cryptography and Information Security"

Similar presentations


Ads by Google