1 / 14

# Applied Cryptography

Applied Cryptography. Chuck Frank Northern Kentucky University. CSC 382/682 Cryptography &amp; Computer Security. CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course. Why Cryptography?.

Télécharger la présentation

## Applied Cryptography

E N D

### Presentation Transcript

1. Applied Cryptography Chuck Frank Northern Kentucky University

2. CSC 382/682 Cryptography & Computer Security • CSC 382 - Upper level undergraduates • CSC 682 – MSCS students • Cryptography is approximately 1/3 of the course

3. Why Cryptography? • Powerful tool for keeping data and communications secure • Cryptography properly applied lessen security threats.

4. Goals • Students should be able to apply cryptography in the software they will develop. • Students should be able to apply cryptography in the systems they will manage.

5. Incorporating Cryptographyinto Programs • Reference: • Garns & Somerfield, Professional Java Security, Wrox Press • Java Cryptography Extension (JCE)

6. Java Cryptography • Look at a variety of Java cryptography applications • Assign several small Java programs including a network application

7. Incorporating Cryptography into Computer Systems • Kaufman, Perlman, Speciner, Network Security, 2nd edition, Prentice Hall

8. Knowledge of Modern Cryptography • Secret Key Cryptography • Public Key Cryptography • Hashing and Message Digests • Protocols

9. Secret Key Cryptography • What is it? • Basic understanding of algorithms • DES • Triple-DES • Rijndael

10. Public Key Cryptography • What is it? • Algorithms • RSA • Diffie Hellman

11. Hashes and Message Digest • Why is useful? • Basic understanding of algorithms • MD5 • SHA-1 • Tripwire

12. Protocols • SSL/TSL • Used for e-commerce • Public key for key exchange • Secret key for encryption • IPSec • Use for VPNs

13. Mathematical Background • Student have had 10 hours of calculus & discrete math • Cover sufficient number theory • Modular arithmetic & Euler’s theorem • To understand RSA • Generation of probable primes

14. Not Covered • Classical, yet obsolete, ciphers • Caesar, Vigenére • History of cryptography

More Related