Lec1 - Applied Cryptography and Computer Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Applied Cryptography and Computer Security Instructor: Sheng Zhong
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 What is the purpose of this course? Our purpose is studying cryptography in a rigorous manner , with emphasis on careful design and analysis of secure systems using existing building blocks . Traditional crypto courses usually care more about math foundations than about applications . Traditional security courses usually present crypto tools informally , without rigorous definitions and derivations .
Background image of page 2
3 Our focus Correct application of crypto techniques in practical scenarios. Not the math principles behind these techniques. Not the implementation of crypto systems. Math Foundations Implementation Design and Analysis We’re here
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 What does this course cover? Security model and cryptographic tools Encryption Symmetric-key encryption Asymmetric-key encryption Message authentication Message Authentication Code (MAC) Digital signature
Background image of page 4
5 What does this course cover? (Cont’d) Entity authentication Password-based authentication Public-key-based entity authentication Cryptographic protocol And more… (if time allows)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Textbook and Prerequisites Recommended Textbooks: (No Required) Wenbo Mao, Modern cryptography: theory and practice . Prentice-Hall, PTR. Douglas Stinson, Cryptography: Theory and Practice . CRS Press. Prerequisites:
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 20

Lec1 - Applied Cryptography and Computer Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online