Basic HTML version of Foils prepared May 30 99

Foil 2 Abstract of CPS714 Mathematics of Security Lecture

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


Note this material is not impacted by recent (Web) advances and so can be studied in "venerable" books such as:
Network Security: Private Communication in a Public World, Kaufman, Perlman and Speciner, Prentice Hall 1995
Web leads to important new applications of security mathematics and nifty pure mathematics is making progress in cracking longer and longer keys
We discuss Secret Key Technology and Public Key Technology with applications to
  • Transmission over insecure media
  • Digital signatures
  • Message Integrity



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999