Download presentation
Presentation is loading. Please wait.
Published byAubrey Brown Modified over 8 years ago
1
Cryptology aka Cryptography Tim Cahill Ryan Church
2
Project Plan Understand both public-key and symmetric cryptography Explore types of functions used: –hash Be able to create cryptographic programs. Learn the significance of key length. –Lower number bits = easier hacking DON’T FAIL!
3
Project Goals Compare the types of ciphers: –Similarities –Differences Cryptographic systems: –Public key, symmetric-key Purpose: –Security measures –Privacy –Authentication
4
Main Concepts Cryptology- the science of writing in secret code. Cipher- is an algorithm for performing encryption and decryption. Public-key cryptography- is a method for secret communication between two parties without requiring an initial exchange of secret keys. Symmetric-key algorithms- are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption. Caesar cipher- is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
5
References Spam and the ongoing battle for the inbox. Communications of the ACM, Volume 50, #2 (2007), pages 24-33. Joshua Goodman, Gordon V. Cormack, David Heckerman. Textbook: Invitation to computer science java version Edition 3, Schneider, copyright 07. pages 600-607 An overview of cryptography. Gary C. Kessler, may 1998 (23 January 2009). (website) www.garykessler.net/library/crypto.html#purpose
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.