week1 - SIT281 Introduction to Cryptography Lecture 1a...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
SIT281 Introduction to Cryptography Lecture 1a About the Unit and Cryptography
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Unit Guide… > Is on DSO and you should read through it carefully. > The outline for what we cover each week is there. > We rely heavily on the textbook, so you will need it right away.
Background image of page 2
Assignments > There will be four assignments. See the unit guide for the dates and write them in your diary. > When they are ready, they will be posted on DSO. > They are each worth 10% of the total value of your final mark.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The exam > The exam is worth 60% of your final mark. > This unit ran for the first time in 2007. There is one past exam to look at.
Background image of page 4
The pracs > We will be using Maple9 Classic software for the practical classes. > Appendix B of the text (see the back pages) tells you how to download the crypto.mws file with crypto commands into your version of Maple. > Off-campus students can download the Maple software from DSO as will be indicated in the first prac information.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The pracs cont’d > You do not need prior knowledge of Maple to do the pracs. > Everything you need will be supplied during this unit. > There are lots of examples in Appendix B and we will post more information on DSO.
Background image of page 6
Now let’s take a look at some crypto! > Cryptography comes from the Greek kryptos meaning ‘hidden’ and grafo, to write. > You will also see the word cryptology used; the latter part is from logia, to study. > The point of cryptography is to protect information from some people while giving others easy access.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CONTENT OF THE UNIT > This unit looks at the role of cryptography in securing information. > It presents the methods used to protect information from over 2000 years ago to the present. > We look at some of the current applications in security management such as digital cash and certificates.
Background image of page 8
The history > Cryptography has been around for a long time: a well known system is supposed to have been used by Julius Caesar, about 100BC to 44BC. > Up until the 19’th century, most systems used were just sophisticated versions of the earliest ones.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How it works > The underlying idea in ‘hiding’ a message is to take the written form (plaintext) convert to a numerical form apply a formula to the numbers convert back to written (ciphertext) send the new written message
Background image of page 10
The basic idea cont’d > Of course, the legitimate receiver of the message needs to know the formula in order to convert back. > The good thing is that simply knowing one formula means that your receiver can read ANY message you send. > Someone who intercepts your message but does not know the formula, cannot read it.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Let’s look at an example > First of all, in this class we use the English alphabet based on 26 letters. > Other alphabets have different numbers of letters, and
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/12/2010 for the course CRYOPTOGRA 3232 taught by Professor Jhhgjhgjh during the Spring '10 term at Trinity College, Hartford.

Page1 / 101

week1 - SIT281 Introduction to Cryptography Lecture 1a...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online