Download presentation
Presentation is loading. Please wait.
1
Introduction to Cryptography and Security Mechanisms 2005 Dr Keith Martin McCrea 349 Tel. 01784 443099 keith.martin@rhul.ac.uk
2
Introduction to Cryptography and Security Mechanisms 2005 2 Why are we here?
3
Introduction to Cryptography and Security Mechanisms 2005 3 This module Lectures Exercises Assignments Tutorials Forum Maths Class Self Study Web siteOffice hours Study groups Library The Web
4
Introduction to Cryptography and Security Mechanisms 2005 4 Module Web Site www.isg.rhul.ac.uk/msc/teaching/ic2/ic2.shtml OverviewNotice BoardSchedule Discussion Forum ResourcesExercisesMaths Help
5
Introduction to Cryptography and Security Mechanisms 2005 5 Learning Outcomes Explain exactly what cryptography can be used for. Appreciate the differences between various types of cipher system and in which situations they are most usefully employed. Identify the issues that need to be addressed when assessing what types of cryptographic mechanism are necessary to "secure" an application. Describe several basic cryptographic mechanisms for providing each of the core security services. Identify the limitations of cryptography and how to support it within a full security architecture.
6
Introduction to Cryptography and Security Mechanisms 2005 6 Notice Board Primary means of communicating with you outside of lectures Check this weekly!
7
Introduction to Cryptography and Security Mechanisms 2005 7 Schedule Week 1, 05/10/05: Overview: Part 1 (presented by Fred Piper) Week 2, 12/10/05: Overview: Part 2 (presented by Fred Piper) Week 3, 19/10/05: Basic principles (READING WEEK) Week 4, 26/10/05: Historical algorithms / theoretical vs practical security Week 5, 02/11/05: Symmetric algorithms Week 6, 09/11/05: Public key algorithms Week 7, 16/11/05: Cryptographic services Week 8, 23/11/05: Digital signatures Week 9, 30/11/05: Key management (presented by Mick Ganley) Week 10, 07/12/05: Public key infrastructures Week 11, 14/12/05: TBA
8
Introduction to Cryptography and Security Mechanisms 2005 8 Module Discussion Forum There is a discussion forum devoted to this module on the ISG forum site: –www.isg.rhul.ac.uk/forum –Username BBPassword ISGforum –Forum IC2/SC02 An Introduction to Cryptography.. You will regularly be directed to post things to this site A good use of this area would be to discuss answers to exercises and post interesting links and resources I will visit this forum on a weekly basis
9
Introduction to Cryptography and Security Mechanisms 2005 9 Module Tutorials Two small group tutorials will be held in Week 4 and Week 9 Tutorials for part-time students will take place once the Maths Tutorials have ended Tasks for these tutorials will be assigned in the previous week’s lecture Look out for announcements and details
10
Introduction to Cryptography and Security Mechanisms 2005 10 Exercises Made available on a unit by unit basis on the module web site from Week 3 onwards. Solutions to exercises can be posted to the module discussion forum.
11
Introduction to Cryptography and Security Mechanisms 2005 11 Assignments There will be two occasions when you should hand in solutions to set work for feedback: Set in Week 4 for handing in Week 5 Set in Week 9 for handing in Week 10
12
Introduction to Cryptography and Security Mechanisms 2005 12 Office Hours Thursdays 12.00 – 13.00 McCrea 349 At other times by appointment keith.martin@rhul.ac.uk
13
Introduction to Cryptography and Security Mechanisms 2005 13 Resources Resource site on the module web site: –Books (there is no comprehensive textbook for this module) –General resources (portals, tutorials etc) –Resources by unit Resource are for your further study –You will be directed to particular resources from time to time There is only one essential resource: –Fred Piper and Sean Murphy, Cryptography: A Very Short Introduction (Oxford, 2002)
14
Introduction to Cryptography and Security Mechanisms 2005 14 Maths Help Online Mathematics Unit – accessible via the module web site Password is… Mathematics Tutorial for questions arising from study of the Online Mathematics Unit (HLT2 after this lecture) Mathematics Tutorials begin in Week 2 Please access the Online Mathematics Unit before coming along to the tutorials
15
Introduction to Cryptography and Security Mechanisms 2005 15 Week 3 There is no formal lecture in Week 3. The material for Week 3 (Unit 3: Basic Principles) has been placed on the web: –http://www.isg.rhul.ac.uk/~pnai166/ic02/unit3/html/1.htm –Username IC2unit3Password… –A link has been placed on the module web site –Require: Internet connection –Preferable: flash, ability to handle rm files –If you have problems contact Amit.Lakhani@rhul.ac.uk Please post solutions to Exercise 3.1 onto the module discussion forum
16
Introduction to Cryptography and Security Mechanisms 2005 16 This module Lectures Exercises Assignments Tutorials Forum Maths Class Self Study Web siteOffice hours Study groups Library The Web
17
Introduction to Cryptography and Security Mechanisms 2005 17 Four things to do this week 1.Visit the module web site, bookmark it and make a habit of checking it regularly 2.Work out how to access the module discussion forum on the Information Security Forum 3.Access the Online Mathematics Unit and start to study it (if you need to) 4.Obtain a copy of Piper+Murphy and read it as soon as you can.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.