14
Applied Cryptography Chuck Frank Northern Kentucky University

Applied Cryptography

  • Upload
    aletha

  • View
    30

  • Download
    1

Embed Size (px)

DESCRIPTION

Applied Cryptography. Chuck Frank Northern Kentucky University. CSC 382/682 Cryptography & Computer Security. CSC 382 - Upper level undergraduates CSC 682 – MSCS students Cryptography is approximately 1/3 of the course. Why Cryptography?. - PowerPoint PPT Presentation

Citation preview

Page 1: Applied Cryptography

Applied Cryptography

Chuck Frank

Northern Kentucky University

Page 2: Applied Cryptography

CSC 382/682 Cryptography & Computer Security CSC 382 - Upper level undergraduates

CSC 682 – MSCS students

Cryptography is approximately 1/3 of the course

Page 3: Applied Cryptography

Why Cryptography?

Powerful tool for keeping data and communications secure

Cryptography properly applied lessen security threats.

Page 4: Applied Cryptography

Goals

Students should be able to apply cryptography in the software they will develop.

Students should be able to apply cryptography in the systems they will manage.

Page 5: Applied Cryptography

Incorporating Cryptographyinto Programs Reference:

Garns & Somerfield, Professional Java Security, Wrox Press

Java Cryptography Extension (JCE)

Page 6: Applied Cryptography

Java Cryptography

Look at a variety of Java cryptography applications

Assign several small Java programs including a network application

Page 7: Applied Cryptography

Incorporating Cryptography into Computer Systems Kaufman, Perlman, Speciner, Network

Security, 2nd edition, Prentice Hall

Page 8: Applied Cryptography

Knowledge of Modern Cryptography Secret Key Cryptography

Public Key Cryptography

Hashing and Message Digests

Protocols

Page 9: Applied Cryptography

Secret Key Cryptography

What is it?

Basic understanding of algorithmsDESTriple-DESRijndael

Page 10: Applied Cryptography

Public Key Cryptography

What is it?

AlgorithmsRSADiffie Hellman

Page 11: Applied Cryptography

Hashes and Message Digest

Why is useful?

Basic understanding of algorithmsMD5SHA-1

Tripwire

Page 12: Applied Cryptography

Protocols

SSL/TSLUsed for e-commercePublic key for key exchangeSecret key for encryption

IPSecUse for VPNs

Page 13: Applied Cryptography

Mathematical Background

Student have had 10 hours of calculus & discrete math

Cover sufficient number theoryModular arithmetic & Euler’s theoremTo understand RSAGeneration of probable primes

Page 14: Applied Cryptography

Not Covered

Classical, yet obsolete, ciphersCaesar, Vigenére

History of cryptography