Cryptology aka Cryptography

innocentsickΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 9 μήνες)

74 εμφανίσεις

Cryptology


aka

Cryptography

Tim Cahill


Ryan Church

Project Plan


Understand both public
-
key and symmetric
cryptography


Explore types of functions used:


hash


Be able to create cryptographic programs.


Learn the significance of key length.


Lower number bits = easier hacking



DON’T FAIL!


Project Goals


Compare the types of ciphers:


Similarities


Differences


Cryptographic systems:


Public key, symmetric
-
key


Purpose:


Security measures


Privacy


Authentication



Main Concepts


Cryptology
-

the science of writing in secret code.


Cipher
-

is an algorithm for performing encryption and decryption.


Public
-
key cryptography
-

is a method for secret communication
between two parties without requiring an initial exchange of secret
keys.


Symmetric
-
key algorithms
-

are a class of algorithms for
cryptography that use trivially related, often identical, cryptographic
keys for both decryption and encryption.


Caesar cipher
-

is one of the simplest and most widely known
encryption techniques. It is a type of substitution cipher in which
each letter in the plaintext is replaced by a letter some fixed number
of positions down the alphabet.

References


Spam and the ongoing battle for the inbox.


Communications of the ACM, Volume 50, #2 (2007), pages 24
-
33.


Joshua Goodman, Gordon V. Cormack, David Heckerman.



Textbook: Invitation to computer science java version


Edition 3, Schneider, copyright 07. pages 600
-
607



An overview of cryptography. Gary C. Kessler, may 1998 (23
January 2009). (website)


www.garykessler.net/library/crypto.html#purpose