{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

s-intro - Course Information CSE 207 Modern Cryptography...

Info icon This preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://www-cse.ucsd.edu/users/mihir/cse207 1/1
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptography usage Did you use any cryptography today? 2/1
Image of page 2
Cryptography usage Did you use any cryptography today? over the last week? 2/1
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptography usage Did you use any cryptography today? over the last week? over the Christmas break? 2/1
Image of page 4
Cryptography usage https invokes the Secure Socket Layer (SSL) communication security protocol to securely transmit your credit card number to the server SSL uses cryptography 3/1
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cryptography usage Other uses of cryptography ATM machines On-line banking Remote login and file transfer using SSH 4/1
Image of page 6
What is cryptography about? Adversary: clever person with powerful computer Goals: Data privacy Data integrity and authenticity 5/1
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Privacy The goal is to ensure that the adversary does not see or obtain the data (message) M . Example : M could be a credit card number being sent by shopper Alice to server Bob and we want to ensure attackers don’t learn it. 6/1
Image of page 8
Integrity and authenticity The goal is to ensure that M really originates with Alice and not someone else M has not been modified in transit 7/1
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Integrity and authenticity example Alice Bob (Bank) Alice Pay $100 to Charlie a45 Adversary Eve might Modify “Charlie” to “Eve” Modify “$100” to “$1000” Integrity prevents such attacks. 8/1
Image of page 10
Medical databases Doctor Reads F A Modifies F A to F A Get Alice a45 F A a27 Put: Alice, F A a45 Database Alice F A Bob F B Alice F A Bob F B 9/1
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Medical databases Doctor Reads F A Modifies F A to F A Get Alice a45 F A a27 Put: Alice, F A a45 Database Alice F A Bob F B Alice F A Bob F B Privacy: F A , F A contain confidential information and we want to ensure the adversary does not obtain them 9/1
Image of page 12
Medical databases Doctor Reads F A Modifies F A to F A Get Alice a45 F A a27 Put: Alice, F A a45 Database Alice F A Bob F B Alice F A Bob F B Privacy: F A , F A contain confidential information and we want to ensure the adversary does not obtain them Integrity and authenticity: Need to ensure – doctor is authorized to get Alice’s file F A , F A are not modified in transit F A is really sent by database F A is really sent by (authorized) doctor 9/1
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
What is cryptography about? Adversary: clever person with powerful computer Goals: Data privacy Data integrity and authenticity 10/1
Image of page 14
Ideal World Cryptonium pipe: Cannot see inside or alter content. 11/1
Image of page 15

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Ideal World Cryptonium pipe: Cannot see inside or alter content. All our goals would be achieved! 11/1
Image of page 16
Ideal World Cryptonium pipe: Cannot see inside or alter content. All our goals would be achieved!
Image of page 17

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}