Download presentation
Presentation is loading. Please wait.
1
Chuck Frank Northern Kentucky University
Applied Cryptography Chuck Frank Northern Kentucky University
2
CSC 382/682 Cryptography & Computer Security
CSC Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course
3
Why Cryptography? Powerful tool for keeping data and communications secure Cryptography properly applied lessen security threats.
4
Goals Students should be able to apply cryptography in the software they will develop. Students should be able to apply cryptography in the systems they will manage.
5
Incorporating Cryptography into Programs
Reference: Garns & Somerfield, Professional Java Security, Wrox Press Java Cryptography Extension (JCE)
6
Java Cryptography Look at a variety of Java cryptography applications
Assign several small Java programs including a network application
7
Incorporating Cryptography into Computer Systems
Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall
8
Knowledge of Modern Cryptography
Secret Key Cryptography Public Key Cryptography Hashing and Message Digests Protocols
9
Secret Key Cryptography
What is it? Basic understanding of algorithms DES Triple-DES Rijndael
10
Public Key Cryptography
What is it? Algorithms RSA Diffie Hellman
11
Hashes and Message Digest
Why is useful? Basic understanding of algorithms MD5 SHA-1 Tripwire
12
Protocols SSL/TSL IPSec Used for e-commerce
Public key for key exchange Secret key for encryption IPSec Use for VPNs
13
Mathematical Background
Student have had 10 hours of calculus & discrete math Cover sufficient number theory Modular arithmetic & Euler’s theorem To understand RSA Generation of probable primes
14
Not Covered Classical, yet obsolete, ciphers History of cryptography
Caesar, Vigenére History of cryptography
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.