Basic HTML version of Foils prepared
July 6 99
Foil 23 Cryptography (1)
From
Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track --
June 2 and June 7 99
.
by
Roman Markowski
1
PlainText
2
Ciphertext
3
PlainText
4
Encryption
5
Decryption
6
Most ciphers consists of public algorithm and a key which needs to be long to be safe (40, 56, 128 bits)
7
Encryption and decryption is computationally expensive
8
Brute force attack:
if it takes one day for a device to break 40 bit DES,
it takes 7 years for the same device to break 56 bit DES
it takes several billion years to break 112 bit 3DES
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Tue Jul 6 1999