This preview shows pages 1–13. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: 1 Applied Cryptography and Computer Security Instructor: Sheng Zhong 2 What is the purpose of this course? Our purpose is studying cryptography in a rigorous manner , with emphasis on careful design and analysis of secure systems using existing building blocks . Traditional crypto courses usually care more about math foundations than about applications . Traditional security courses usually present crypto tools informally , without rigorous definitions and derivations . 3 Our focus Correct application of crypto techniques in practical scenarios. Not the math principles behind these techniques. Not the implementation of crypto systems. Math Foundations Implementation Design and Analysis Were here 4 What does this course cover? Security model and cryptographic tools Encryption Symmetrickey encryption Asymmetrickey encryption Message authentication Message Authentication Code (MAC) Digital signature 5 What does this course cover? (Contd) Entity authentication Passwordbased authentication Publickeybased entity authentication Cryptographic protocol And more (if time allows) 6 Textbook and Prerequisites Recommended Textbooks: (No Required) Douglas Stinson, Cryptography: Theory and Practice . CRS Press. Wenbo Mao, Modern Cryptography: Theory and Practice . PrenticeHall, PTR. Prerequisites: Introductory class in theory of computation. Math maturity. 7 Grading Components: Class attendance (randomly taken) 10% Discussions 20% Each time you participate, you will have the chance (NOT guaranteed!) to receive one or more +. To avoid losing points in this component, you need to get at least 2 + throughout the entire semester. You need to start your participation early, because we can accommodate only a few people in each class. Homeworks 20% Project 50% NO EXAM 8 Questions? 9 What is Cryptography? A Simple Game of Coin Flipping 10 Coin Flipping Game Participants: Alice and Bob. Computational model: Each participant has a computer ( probabilistic Turing machine running in polynomial time ). Communication model: The two computers are connected by the Internet ( communication channel ). Target: Alice and Bob agree on the value of a fair coin. 11 NOTE: Cryptography is NOT just scrambling bits It is a general theory about doing things securely and/or privately. Whenever we have a crypto problem, we need to consider (just as in the coin flipping game): Who are the participants ? What is the computational model ? What is the communication model ? What is our target ? 12 Tool for the Coin Flipping Game To solve this problem, we use the crypto tool of collisionresistant hash function ....
View
Full
Document
This note was uploaded on 09/27/2010 for the course CSE 664 taught by Professor Shengzhong during the Spring '10 term at SUNY Buffalo.
 Spring '10
 SHENGZHONG
 Computer Security

Click to edit the document details