lec-02 - CSE565: Computer Security Lecture 2 Basic...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York, 14260 9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.2 Overview Lecture 2 Overview Terminology (5 minutes) Encryption by Substitutions & Transpositions (45 minutes)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.3 Announcements Recitation for next week Properties of Arithmetic Inverses Divisors Prime Numbers Greatest Common Divisor Recitation for the following week Modular arithmetic Basic properties Operations 9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.4 Terminology Encryption A process of encoding a message Decryption It is the reverse process Encryption Algorithms A key K is generally used Symmetric encryption: Asymmetric encryption: )) , ( , ( P K E K D P = )) , ( , ( P K E K D P E D = Plaintext P=(p1,p2, …pn) Ciphertext Original Plaintext Encryption Decryption C=(c1,c2, … cm) C=E(P) P=D(C) =D(E(P))
Background image of page 2
3 9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.5 Cryptography & Cryptanalysis Cryptography Hidden writing -- encryption to conceal text Cryptanalysis Break an encryption Attempt to break a single message Attempt to recognize patterns in encrypted messages Attempt to find general weaknesses Breakable Encryption
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/12/2010 for the course CSE 565 taught by Professor Shambhu during the Fall '09 term at SUNY Buffalo.

Page1 / 7

lec-02 - CSE565: Computer Security Lecture 2 Basic...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online