Crypto - Administrivia - PowerPoint PPT Presentation

About This Presentation
Title:

Crypto - Administrivia

Description:

Prontuario (including exam and project dates) Links to old exams and labs ... ICOM 5995 (crypto) - Noack. System Security. Intruders. Malicious Software. Firewalls ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 9
Provided by: tomn8
Learn more at: http://ece.uprm.edu
Category:

less

Transcript and Presenter's Notes

Title: Crypto - Administrivia


1
Crypto - Administrivia
  • Prontuario - Please time-share and ask questions
  • Info is in my homepage amadeus.uprm.edu/noack/
  • Make bookmark for ICOM5995 (crypto)
  • Page contains
  • Prontuario (including exam and project dates)
  • Links to old exams and labs
  • Links to text authors page
  • Links to current assignments as developed
  • Course includes
  • Exams and lecture material
  • Some problem sets
  • Project (described in course page)
  • Lab
  • In OS/Networking lab if needed
  • Individual programs, possibly using java.crypt
    package

2
More Administrivia
  • Accounts already exist for most students
  • Will be automatically created for others
  • Please find me by e-mail - noack - or X3652
  • Projects
  • Info on course page
  • Try to form groups soon - three or four people
  • Project can be
  • Hacking exploit study or countermeasure
  • Study and explanation of crypto application for
    example state of present-day browser security

3
Course overview
  • Overview
  • A little history and the scope of crypto and
    data security
  • Symmetric Ciphers
  • The various modern private-key algorithms
  • Public-key Encryption And Hash Functions
  • Identifying people at a distance authentication
    of documents
  • Network Security Practice
  • System Security

4
Overview
  • Services, Mechanisms, and Attacks
  • A Model for Network Security

5
Symmetric Ciphers
  • Classical Encryption Techniques
  • Block Ciphers And The Data Encryption Standard
  • Block Cipher Principles
  • The Data Encryption Standard and Its Analysis
  • Block Cipher Modes of Operation
  • Introduction To Finite Fields
  • Advanced Encryption Standard
  • Contemporary Symmetric Ciphers
  • Confidentiality Using Symmetric Encryption

6
Public-key Encryption And Hash Functions
  • Introduction To Number Theory
  • Public-key Cryptography And Rsa
  • Key Management Other Public-key Cryptosystems
  • Message Authentication And Hash Functions
  • Hash Algorithms
  • Digital Signatures And Authentication Protocols

7
Network Security Practice
  • Authentication Applications
  • Electronic Mail Security
  • IP Securlty
  • Web Security

8
System Security
  • Intruders
  • Malicious Software
  • Firewalls
Write a Comment
User Comments (0)
About PowerShow.com