applied cryptography
Download
Skip this Video
Download Presentation
Applied Cryptography

Loading in 2 Seconds...

play fullscreen
1 / 14

Applied Cryptography - PowerPoint PPT Presentation


  • 132 Views
  • Uploaded on

Applied Cryptography. Chuck Frank Northern Kentucky University. CSC 382/682 Cryptography & Computer Security. CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course. Why Cryptography?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Applied Cryptography' - aletha


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
applied cryptography

Applied Cryptography

Chuck Frank

Northern Kentucky University

csc 382 682 cryptography computer security
CSC 382/682 Cryptography & Computer Security
  • CSC 382 - Upper level undergraduates
  • CSC 682 – MSCS students
  • Cryptography is approximately 1/3 of the course
why cryptography
Why Cryptography?
  • Powerful tool for keeping data and communications secure
  • Cryptography properly applied lessen security threats.
goals
Goals
  • Students should be able to apply cryptography in the software they will develop.
  • Students should be able to apply cryptography in the systems they will manage.
incorporating cryptography into programs
Incorporating Cryptographyinto Programs
  • Reference:
    • Garns & Somerfield, Professional Java Security, Wrox Press
  • Java Cryptography Extension (JCE)
java cryptography
Java Cryptography
  • Look at a variety of Java cryptography applications
  • Assign several small Java programs including a network application
incorporating cryptography into computer systems
Incorporating Cryptography into Computer Systems
  • Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall
knowledge of modern cryptography
Knowledge of Modern Cryptography
  • Secret Key Cryptography
  • Public Key Cryptography
  • Hashing and Message Digests
  • Protocols
secret key cryptography
Secret Key Cryptography
  • What is it?
  • Basic understanding of algorithms
    • DES
    • Triple-DES
    • Rijndael
public key cryptography
Public Key Cryptography
  • What is it?
  • Algorithms
    • RSA
    • Diffie Hellman
hashes and message digest
Hashes and Message Digest
  • Why is useful?
  • Basic understanding of algorithms
    • MD5
    • SHA-1
  • Tripwire
protocols
Protocols
  • SSL/TSL
    • Used for e-commerce
    • Public key for key exchange
    • Secret key for encryption
  • IPSec
    • Use for VPNs
mathematical background
Mathematical Background
  • Student have had 10 hours of calculus & discrete math
  • Cover sufficient number theory
    • Modular arithmetic & Euler’s theorem
    • To understand RSA
    • Generation of probable primes
not covered
Not Covered
  • Classical, yet obsolete, ciphers
    • Caesar, Vigenére
  • History of cryptography
ad