1 / 6

CSC 386 – Computer Security

CSC 386 – Computer Security. Scott Heggen. Agenda. Cryptography. Substitution Cipher (Caesar Cipher). k =. Alice. Bob. “ egc hjj ”. C = E( k,m ) = “ egc hjj ”. D. E. “bad egg”. “bad egg”. k. k. Eve. Ciphers. How can we improve upon the Caesar Cipher?.

Download Presentation

CSC 386 – Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSC 386 – Computer Security Scott Heggen

  2. Agenda • Cryptography

  3. Substitution Cipher (Caesar Cipher) k = Alice Bob “egchjj” C = E(k,m) = “egchjj” D E “bad egg” “bad egg” k k Eve

  4. Ciphers • How can we improve upon the Caesar Cipher?

  5. Other Substitution Ciphers k =

  6. Assignment • For Monday: • Create a Python script which takes in two files:original_message.txtand key.txt • The original_message.txtfile can contain any message you chose to send me • The key.txt file must contain your B-number, without the letter B • The Python script must compute C using the message and the key. Your encryption algorithm E should be a pseudo-random substitution cipher which shifts each letter of message by the integer value in key with the same index (e.g., message[0] should be shifted by key[0] letters) • Submit to Moodle: • Your Python Script • coded_message.txt

More Related