1 / 14

Applied Cryptography

Applied Cryptography. Chuck Frank Northern Kentucky University. CSC 382/682 Cryptography & Computer Security. CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course. Why Cryptography?.

aletha
Télécharger la présentation

Applied Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Applied Cryptography Chuck Frank Northern Kentucky University

  2. CSC 382/682 Cryptography & Computer Security • CSC 382 - Upper level undergraduates • CSC 682 – MSCS students • Cryptography is approximately 1/3 of the course

  3. Why Cryptography? • Powerful tool for keeping data and communications secure • Cryptography properly applied lessen security threats.

  4. Goals • Students should be able to apply cryptography in the software they will develop. • Students should be able to apply cryptography in the systems they will manage.

  5. Incorporating Cryptographyinto Programs • Reference: • Garns & Somerfield, Professional Java Security, Wrox Press • Java Cryptography Extension (JCE)

  6. Java Cryptography • Look at a variety of Java cryptography applications • Assign several small Java programs including a network application

  7. Incorporating Cryptography into Computer Systems • Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall

  8. Knowledge of Modern Cryptography • Secret Key Cryptography • Public Key Cryptography • Hashing and Message Digests • Protocols

  9. Secret Key Cryptography • What is it? • Basic understanding of algorithms • DES • Triple-DES • Rijndael

  10. Public Key Cryptography • What is it? • Algorithms • RSA • Diffie Hellman

  11. Hashes and Message Digest • Why is useful? • Basic understanding of algorithms • MD5 • SHA-1 • Tripwire

  12. Protocols • SSL/TSL • Used for e-commerce • Public key for key exchange • Secret key for encryption • IPSec • Use for VPNs

  13. Mathematical Background • Student have had 10 hours of calculus & discrete math • Cover sufficient number theory • Modular arithmetic & Euler’s theorem • To understand RSA • Generation of probable primes

  14. Not Covered • Classical, yet obsolete, ciphers • Caesar, Vigenére • History of cryptography

More Related