MU CSCI 415 - Introduction to Cyrptography (19 pages)

Previewing pages 1, 2, 3, 4, 5, 6 of 19 page document View the full content.
View Full Document

Introduction to Cyrptography



Previewing pages 1, 2, 3, 4, 5, 6 of actual document.

View the full content.
View Full Document
View Full Document

Introduction to Cyrptography

22 views


Pages:
19
School:
Millersville University
Course:
Csci 415 - Computer and Network Security

Unformatted text preview:

Introduction to Cryptography Flow 3 parts to Cryptography lecture in CSCI 415 Intro to Cryptography Symmetric Key Encryption Asymmetric Key Encryption digital signatures digital certificates digital envelopes SSL TLS 3 related lab components Dr Nazli Hardy Introduction to Cryptography Overview The fundamentals and history Character Level Encryption Substitutional Monoalphabetic Polyalphabetic Gronsfeld s System Vigenere Transpositional Bit Level Encryption Permutation Exclusive OR XOR Rotation Data Encryption Standard DES Advanced Encryption Standard AES International Data Encryption Algorithm Blowfish and RC5 block ciphers Dr Nazli Hardy Introduction to Cryptography Fundamentals Cryptography process of converting plaintext readable text into ciphertext unreadable encrypted text by authorized sender encryption Equally important is this system is the re conversion from unreadable to readable text by authorized recipient decryption Keys Symmetric Encryption Asymmetric encryption While cryptography obscures hides the meaning of the data from unauthorized user it does not hide the data itself what is that process called Dr Nazli Hardy Introduction to Cryptography History cryptography is nothing new Egyptian hieroglyphics found on ancient monuments were encrypted ca 4500 BC The Book of Jeremiah was written using a cipher or key known as atbash Connected with religious and academic literature and powers of the day Queen Elizabeth I ca 1550 Kama Sutra ca 2000 years ago recommends that men and women learn the art of cryptography Julius Caesar shifter letters by 3 positions i e a becomes d Used both in WW I and WW II Good book The Codebreakers David Kahn McMillan 1967 Dr Nazli Hardy Introduction to Cryptography War Machines Enigma machines used by Germans during WW II Developed by Arthur Scherbius How does it work The code was first broken by Polish cryptographers then by the British and Americans Dr Nazli Hardy Introduction to Cryptography Enigma Displayed at the National



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Introduction to Cyrptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Cyrptography and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?