Title and abstract for

Basic Mathematics of Security Systems

Given by Geoffrey C. Fox at CPS714 Computational Science Information Track on June 2 99. Foils prepared May 30 99
which leads to edit sector initialized at overall parameters
which lists all addon files pointed to in foilset
This is a SINGLE file Containing all Foils in nonIMAGE (i.e. HTML) form
This contains all WebWisdom links preceded by those referenced in this foilset
This contains an Index of Foilset Suitable for Printing (There is no easy way of Printing all foils -- just the index)
This just contains Title of Foilset and Links

Note this material is not impacted by recent (Web) advances and so can be studied in "venerable" books such as:
Network Security: Private Communication in a Public World, Kaufman, Perlman and Speciner, Prentice Hall 1995
Web leads to important new applications of security mathematics and nifty pure mathematics is making progress in cracking longer and longer keys
We discuss Secret Key Technology and Public Key Technology with applications to
  • Transmission over insecure media
  • Digital signatures
  • Message Integrity


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999