8
CSC 386 – Computer Security Scott Heggen

CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Embed Size (px)

Citation preview

Page 1: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

CSC 386 – Computer Security

Scott Heggen

Page 2: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Agenda

• Emmanuel Tachu will present his work from an independent study on Networking• Cryptography Primer

Page 3: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Last Week’s Homework

• Bell-LaPadula Model• Deadline extended until 11:55pm today

Page 4: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Cryptography Primer

Alice Bob

m

Eve

Page 5: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Cryptography Primer

Alice Bob

Eve

k k

m EC = E(k,m)

mD

Page 6: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Symmetric Key

• Both Alice and Bob’s key are the same• Must be shared prior to communications• What is the key?

Page 7: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Substitution Cipher (Caesar Cipher)

A C

B E

C F

D G

E H

F I

G J

… …

k = Alice Bob

Eve

k k

“bad egg” EC = E(k,m) = “egc hjj”

“bad egg”D “egc hjj”

Page 8: CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer

Assignment

• For Friday:• Create a Python script which takes in two files: message.txt and key.txt• The message.txt file can contain any message you chose to send me• The key.txt file must contain your B-number, without the letter B• The Python script must compute C using the message and the key. Your

encryption algorithm E should be a simple substitution cipher which shifts each letter of message by the integer value in key.

• Submit to Moodle:• Your Python Script• coded_message.txt