1 / 11

CS2910 Week 9, Class 2

Learn about network security, encryption, and the historical significance of the WWII Enigma machine and known-plaintext attack. Discover standard algorithms and the importance of session keys.

biscoe
Download Presentation

CS2910 Week 9, Class 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS2910Week 9, Class 2 • Today • Network Security – Focus on Encryption • Week 9, Monday • Quiz: Potential topics • TCP window size & header format • Public/private key encryption • Sharing symmetric keys • Applying a stream cipher • Known-plaintext attack • Unicode, UTF-8 encoding, and quoted-printable • May include some questions requiring you to interpret or create raw data SE-2811 Slide design: Dr. Mark L. Hornick Content: Dr. Hornick Errors: Dr. Yoder

  2. WWII Encryption:The Enigma Machine A story of a known-plaintext attack http://www.cnet.com/pictures/breaking-the-nazis-enigma-codes-at-bletchley-park-photos/2/ SE-2811 Dr.Yoder

  3. WWII Encryption:The Enigma and the Bomb Mavis Batey SE-2811 Dr.Yoder

  4. Video Questions SE-2811 Dr.Yoder

  5. Video Questions SE-2811 Dr.Yoder

  6. Video Questions SE-2811 Dr.Yoder

  7. Video Questions SE-2811 Dr.Yoder

  8. Video Questions SE-2811 Dr.Yoder

  9. Themes • Standard Algorithms • What are they? • How do they work? • Why not make your own? • Session Keys • How to share keys? • Why use if public/private keys are needed anyway? • Why regenerate for every session? • Detecting Forgery / Man-in-the middle

  10. Standard Block Cipher Algorithms • DES, Triple DES (Data Encryption Standard) • NSA • AES (Advanced Encryption Standard) • NIST, but note NSA involvement in other algorithms published by NIST • Blowfish • Not standard. Self-published algorithm • Why not write your own? (Because …) SE-2811 Dr.Yoder

  11. SE-2811 Dr. Josiah Yoder

More Related