Week 6 Lecture Notes

Week 6 Lecture Notes - on a key to use RSA is Asymmetric...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
February 11: Lecture 16 Announcements Assignment 3 due by midnight (2/12) Midterm this Friday: Multiple Choice 20-25 questions, no history facts; general concept questions Answers to Assignments 1, 2, and 3 will be posted on WebtCT so go online to check the correct answers to each question. Chara. Freq. Fixed Length Code Total a 82 000 (82 x 3) => 246 bit b 15 001 45 bits c 28 010 84 bits d 43 011 129 bits e 127 100 381 bits f 22 101 66 bits g 20 110 60 bits 1011 bits Make shorter with an unambiguous “free-length” code. “Huffman” Coding fulfills this shorter code and gets the job done. In Huffman coding, common letters get shorter length while rare letters get longer length.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
February 13: Lecture 17 Is the Diffie-Hellman method an example of an Asymmetric Cipher? A : NO , it is symmetric because Alice and Bob AGREE
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: on a key to use RSA is Asymmetric Unbreakable Midterm Topics What is Steganography? What is Cryptography? Transposition Ciphers Example: Rail Shift Ciphers Substitution Ciphers: Making and Breaking Them Monoalphabetic Caesar Shift Codes, Nomenclators Monoalphabetic with Codeword Monoalphabetic with Homophones Polyalphabetic: The Vigenere Cipher One-time Pad Ciphers Book Ciphers Binary representations (e.g., ASCII) An example binary transposition cipher An example binary substitution cipher Public-Key Cryptography The Key Distribution Problem / Padlock Metaphor One-way Functions Modular Arithmetic The Diffie-Hellman Protocol Asymmetric Ciphers (vs. Symmetric) RSA...
View Full Document

Page1 / 3

Week 6 Lecture Notes - on a key to use RSA is Asymmetric...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online