Basic Mathematics of Security Systems CPS714 Summer 99 Lecture recorded May 30 99 for delivery June 2 99

5/30/99


Click here to start


Table of Contents

Basic Mathematics of Security Systems CPS714 Summer 99 Lecture recorded May 30 99 for delivery June 2 99

Abstract of CPS714 Mathematics of Security Lecture

Introduction to Cryptography

Breaking an Encryption Scheme

Types of Cryptographic Function

Security Uses of Cryptography

Secret Key Cryptography

Uses of Secret Key Cryptography

Secret Key Authentication

Message Integrity with Secret Key Cryptography

Public Key Cryptography

Insecure Link Transmission with Public Key Cryptography

Authentication with public key Cryptography

Digital Signatures and Public Key Cryptography

Use of Digital Signatures with public key Cryptography

Hash and Message Digests in Detail

Some Math Behind Secret Key Cryptography

Some Math behind RSA Algorithm -I

Some Math behind RSA Algorithm -II

Combining Public and Secret Keys

Author: Geoffrey Fox

Email: gcf@npac.syr.edu

Home Page: http://www.npac.syr.edu