Basic HTML version of Foils prepared July 6 99

Foil 23 Cryptography (1)

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski


1 PlainText
2 Ciphertext
3 PlainText
4 Encryption
5 Decryption
6 Most ciphers consists of public algorithm and a key which needs to be long to be safe (40, 56, 128 bits)
7 Encryption and decryption is computationally expensive
8 Brute force attack:
  • if it takes one day for a device to break 40 bit DES,
  • it takes 7 years for the same device to break 56 bit DES
  • it takes several billion years to break 112 bit 3DES

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999