Applied Cryptography - PowerPoint PPT Presentation

About This Presentation
Title:

Applied Cryptography

Description:

Powerful tool for keeping data and communications secure ... Garns & Somerfield, Professional Java Security, Wrox Press. Java Cryptography Extension (JCE) ... – PowerPoint PPT presentation

Number of Views:502
Avg rating:3.0/5.0
Slides: 15
Provided by: office226
Category:

less

Transcript and Presenter's Notes

Title: Applied Cryptography


1
Applied Cryptography
  • Chuck Frank
  • Northern Kentucky University

2
CSC 382/682 Cryptography Computer Security
  • CSC 382 - Upper level undergraduates
  • CSC 682 MSCS students
  • Cryptography is approximately 1/3 of the course

3
Why Cryptography?
  • Powerful tool for keeping data and communications
    secure
  • Cryptography properly applied lessen security
    threats.

4
Goals
  • Students should be able to apply cryptography in
    the software they will develop.
  • Students should be able to apply cryptography in
    the systems they will manage.

5
Incorporating Cryptographyinto Programs
  • Reference
  • Garns Somerfield, Professional Java Security,
    Wrox Press
  • Java Cryptography Extension (JCE)

6
Java Cryptography
  • Look at a variety of Java cryptography
    applications
  • Assign several small Java programs including a
    network application

7
Incorporating Cryptography into Computer Systems
  • Kaufman, Perlman, Speciner, Network Security, 2nd
    edition, Prentice Hall

8
Knowledge of Modern Cryptography
  • Secret Key Cryptography
  • Public Key Cryptography
  • Hashing and Message Digests
  • Protocols

9
Secret Key Cryptography
  • What is it?
  • Basic understanding of algorithms
  • DES
  • Triple-DES
  • Rijndael

10
Public Key Cryptography
  • What is it?
  • Algorithms
  • RSA
  • Diffie Hellman

11
Hashes and Message Digest
  • Why is useful?
  • Basic understanding of algorithms
  • MD5
  • SHA-1
  • Tripwire

12
Protocols
  • SSL/TSL
  • Used for e-commerce
  • Public key for key exchange
  • Secret key for encryption
  • IPSec
  • Use for VPNs

13
Mathematical Background
  • Student have had 10 hours of calculus discrete
    math
  • Cover sufficient number theory
  • Modular arithmetic Eulers theorem
  • To understand RSA
  • Generation of probable primes

14
Not Covered
  • Classical, yet obsolete, ciphers
  • Caesar, Vigenére
  • History of cryptography
Write a Comment
User Comments (0)
About PowerShow.com