1
Basic Mathematics of Security Systems CPS714 Summer 99 Lecture recorded May 30 99 for delivery June 2 99 2
Abstract of CPS714 Mathematics of Security Lecture 3
Introduction to Cryptography 4
Breaking an Encryption Scheme 5
Types of Cryptographic Function 6
Security Uses of Cryptography 7
Secret Key Cryptography 8
Uses of Secret Key Cryptography 9
Secret Key Authentication 10
Message Integrity with Secret Key Cryptography 11
Public Key Cryptography 12
Insecure Link Transmission with Public Key Cryptography 13
Authentication with public key Cryptography 14
Digital Signatures and Public Key Cryptography 15
Use of Digital Signatures with public key Cryptography 16
Hash and Message Digests in Detail 17
Some Math Behind Secret Key Cryptography 18
Some Math behind RSA Algorithm -I 19
Some Math behind RSA Algorithm -II 20
Combining Public and Secret Keys
Click outside pointer rectangle to move pointer
Click on Pointer to Hide
Click on Pointer + ALT to toggle message hiding
Click on Pointer + CNTL to abolish pointer
Click on Pointer + Shift to cycle families
Click outside + Alt is Change Image
Click outside + Control is Double Size
Click outside + Shift is Halve Size
Right Mouse Down on Pointer Toggles Index
Shift Right Mouse aligns top with scrolled Page While With Mouse Down on Current Pointer h hides This Message while m restores i Toggles Index Aligned with Page Top j Toggles Index Aligned with Scrolled View Top a Abolishes Pointer while CNTL-Click restores f cycles through pointer families c cycles through members of a family u increases Size Up and d decreases Down Mouse Up-Down between changes of Pointer to process new option