csce522-lect3 - Cryptography 1 Project Topics Cyber Attacks...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Cryptography 1 Project Topics Cyber Attacks Cryptography Terminology Secret-Key Encryption
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 2 Research Project Project information: http://cse.sc.edu/~farkas/csce522-2011/projec Phase 1 Identifying research interest Forming of groups
Background image of page 2
CSCE 522 - Farkas Project Information Discussion on Student preferences What do you like to work on? E.g., application development, operating systems, databases, hardware design, robotics, game development, etc. What are the security problems in your area of interest? E.g., multilevel secure operating systems, access control in databases, remote controlled robots, etc. How much your group can do within 1 semester? E.g., need to choose a problem that can be addressed within 12 weeks (including any background research, research, development, and writing reports) Be as specific as possible! 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Homework 1 http://cse.sc.edu/~farkas/csce522-2011/homew CSCE 522 - Farkas 4
Background image of page 4
CSCE 522 - Farkas 5 Reading Assignment Reading assignments for August 31: Required: Pfleeger: Ch 2 Recommended: Crypto-Gram Newsletters http://www.schneier.com/crypto-gram.html Security Focus Online, cryptanalysis tools http://www.securityfocus.com/tools/category/54 Judge Rules Man Cannot Be Forced To Decrypt HD, http://news.slashdot.org/article.pl?sid=08/08/19/2028235 F. Kohen, et al., A Short History of Cryptography, http://all.net/books/ip/Chap2-1.html Navajo Code Talkers: World War II Fact Sheet, http://www.history.navy.mil/faqs/faq61-2.htm
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 522 taught by Professor Farkas during the Fall '11 term at South Carolina.

Page1 / 23

csce522-lect3 - Cryptography 1 Project Topics Cyber Attacks...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online