Applied cryptography
This presentation is the property of its rightful owner.
Sponsored Links
1 / 14

Applied Cryptography PowerPoint PPT Presentation


  • 92 Views
  • Uploaded on
  • Presentation posted in: General

Applied Cryptography. Chuck Frank Northern Kentucky University. CSC 382/682 Cryptography & Computer Security. CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course. Why Cryptography?.

Download Presentation

Applied Cryptography

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Applied cryptography

Applied Cryptography

Chuck Frank

Northern Kentucky University


Csc 382 682 cryptography computer security

CSC 382/682 Cryptography & Computer Security

  • CSC 382 - Upper level undergraduates

  • CSC 682 – MSCS students

  • Cryptography is approximately 1/3 of the course


Why cryptography

Why Cryptography?

  • Powerful tool for keeping data and communications secure

  • Cryptography properly applied lessen security threats.


Goals

Goals

  • Students should be able to apply cryptography in the software they will develop.

  • Students should be able to apply cryptography in the systems they will manage.


Incorporating cryptography into programs

Incorporating Cryptographyinto Programs

  • Reference:

    • Garns & Somerfield, Professional Java Security, Wrox Press

  • Java Cryptography Extension (JCE)


Java cryptography

Java Cryptography

  • Look at a variety of Java cryptography applications

  • Assign several small Java programs including a network application


Incorporating cryptography into computer systems

Incorporating Cryptography into Computer Systems

  • Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall


Knowledge of modern cryptography

Knowledge of Modern Cryptography

  • Secret Key Cryptography

  • Public Key Cryptography

  • Hashing and Message Digests

  • Protocols


Secret key cryptography

Secret Key Cryptography

  • What is it?

  • Basic understanding of algorithms

    • DES

    • Triple-DES

    • Rijndael


Public key cryptography

Public Key Cryptography

  • What is it?

  • Algorithms

    • RSA

    • Diffie Hellman


Hashes and message digest

Hashes and Message Digest

  • Why is useful?

  • Basic understanding of algorithms

    • MD5

    • SHA-1

  • Tripwire


Protocols

Protocols

  • SSL/TSL

    • Used for e-commerce

    • Public key for key exchange

    • Secret key for encryption

  • IPSec

    • Use for VPNs


Mathematical background

Mathematical Background

  • Student have had 10 hours of calculus & discrete math

  • Cover sufficient number theory

    • Modular arithmetic & Euler’s theorem

    • To understand RSA

    • Generation of probable primes


Not covered

Not Covered

  • Classical, yet obsolete, ciphers

    • Caesar, Vigenére

  • History of cryptography


  • Login