1 / 6

Cryptography and Network Security

Join our course on cryptography and network security to learn about classical encryption techniques, block ciphers, finite fields, and advanced encryption standards. Gain knowledge in public-key cryptography, key management, message authentication, and digital signatures. Explore topics like electronic mail security, IP and web security, and the prevention of intruders, viruses, worms, and firewalls. Enhance your programming skills through hands-on projects implementing various encryption algorithms.

curleye
Download Presentation

Cryptography and Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography and Network Security • Host Institution – UNC Greensboro • Dr. Shan Suthaharan, primary instructor • Fall 2004, 15 students at UNCG • Remote Classrooms • Dr. Barry Kurtz, AppState, team instructor • 2 students at AppState

  2. Major Topics • Classical encryption techniques. • Block ciphers and the Data Encryption Standard. • Introduction to finite fields. • Advanced Encryption Standard. • Contemporary symmetric ciphers; Confidentiality • Introduction to number theory. • Public-key cryptography and RSA; Key Management. • Message authentication; hash functions; hash algorithms. • Digital signatures; authentication protocols & applications. • Electronic mail security; IP and Web security. • Intruders, viruses, worms and Firewalls.

  3. Programming Projects • Solve a sequence of small encryption/decryption problems • Implement RC5 encryption and decryption • Implement the RSA algorithm

  4. Elliptic CurveCryptography Stephanie Rednour worked under the direction of B. Kurtz on this special research project

  5. GUI for RC5 Encryption • Ramu Pulipati worked under the direction of Shan • Suthaharan on this special research project.

  6. Future Plans – Fall 2005 • Expand team teaching • 10 students are signed up at AppState for Fall 2005 • Use grid-enabled MPI to solve significant problems • Invite students to work on research problems in lieu of regular programming assignments • Encourage students to work in project teams

More Related