lec-02-basic

lec-02-basic - CSE565 Computer Security Lecture 2 Basic...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Shambhu Upadhyaya University at Buffalo Buffalo, New York, 14260
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.2 Overview Lecture 2 Overview Terminology (5 minutes) Encryption by Substitutions & Transpositions (45 minutes)
Background image of page 2
9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.3 Announcements Recitation for next week Properties of Arithmetic Inverses Divisors Prime Numbers Greatest Common Divisor Recitation for the following week Modular arithmetic Basic properties Operations
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
9/02/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 2.4 Terminology Encryption A process of encoding a message Decryption It is the reverse process Encryption Algorithms A key K is generally used Symmetric encryption: Asymmetric encryption: )) , ( , ( P K E K D P = )) , ( , ( P K E K D P E D = Plaintext P=(p1,p2, …pn) Ciphertext Original Plaintext Encryption Decryption C=(c1,c2, … cm) C=E(P) P=D(C) =D(E(P))
Background image of page 4
UB Fall 2010 CSE565: S. Upadhyaya Lec 2.5 Cryptography & Cryptanalysis Cryptography Hidden writing -- encryption to conceal text Cryptanalysis Break an encryption Attempt to break a single message Attempt to recognize patterns in encrypted messages Attempt to find general weaknesses
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/12/2010 for the course CSE 565 taught by Professor Shambhu during the Fall '09 term at SUNY Buffalo.

Page1 / 13

lec-02-basic - CSE565 Computer Security Lecture 2 Basic...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online