Lecture 2 - Class Notes: September 11th, 2008 Elementary...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
th , 2008 Elementary Cryptography -Strongest tool to control security threats -Based in higher Math: Analysis, Number Theory, Probability Theory, Statistics -To use it, don’t need to know the mathematical background. Terminology: Sender: Alice Recipient: Bob S entrusts message to transmission medium T. What can Eve do? 1. Even can try to intercept the message 2. Even can try to block the message 3. Eve can modify the message 4. Eve can fabricate a message Encryption addresses all four of these threats. Most fundamental building block of secure computing. Encryption: encoding a message (encode, encipher) Decryption: decoding a message (decode, decipher) Original message: plaintext Encrypted message: cipher text C= E(P) P = D(E(P)) Algorithms often use a key K. Keys allow us to use the same algorithm so that with different keys, we get different output for the same input. Keys allow you to publish algorithms. C = E(k
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 3

Lecture 2 - Class Notes: September 11th, 2008 Elementary...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online