Download
applied cryptography n.
Skip this Video
Loading SlideShow in 5 Seconds..
Applied Cryptography PowerPoint Presentation
Download Presentation
Applied Cryptography

Applied Cryptography

180 Views Download Presentation
Download Presentation

Applied Cryptography

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Applied Cryptography Chuck Frank Northern Kentucky University

  2. CSC 382/682 Cryptography & Computer Security • CSC 382 - Upper level undergraduates • CSC 682 – MSCS students • Cryptography is approximately 1/3 of the course

  3. Why Cryptography? • Powerful tool for keeping data and communications secure • Cryptography properly applied lessen security threats.

  4. Goals • Students should be able to apply cryptography in the software they will develop. • Students should be able to apply cryptography in the systems they will manage.

  5. Incorporating Cryptographyinto Programs • Reference: • Garns & Somerfield, Professional Java Security, Wrox Press • Java Cryptography Extension (JCE)

  6. Java Cryptography • Look at a variety of Java cryptography applications • Assign several small Java programs including a network application

  7. Incorporating Cryptography into Computer Systems • Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall

  8. Knowledge of Modern Cryptography • Secret Key Cryptography • Public Key Cryptography • Hashing and Message Digests • Protocols

  9. Secret Key Cryptography • What is it? • Basic understanding of algorithms • DES • Triple-DES • Rijndael

  10. Public Key Cryptography • What is it? • Algorithms • RSA • Diffie Hellman

  11. Hashes and Message Digest • Why is useful? • Basic understanding of algorithms • MD5 • SHA-1 • Tripwire

  12. Protocols • SSL/TSL • Used for e-commerce • Public key for key exchange • Secret key for encryption • IPSec • Use for VPNs

  13. Mathematical Background • Student have had 10 hours of calculus & discrete math • Cover sufficient number theory • Modular arithmetic & Euler’s theorem • To understand RSA • Generation of probable primes

  14. Not Covered • Classical, yet obsolete, ciphers • Caesar, Vigenére • History of cryptography