Basic Mathematics of Security Systems CPS714 Summer 99Lecture recorded May 30 99 for delivery June 2 99
Abstract of CPS714 Mathematics of Security Lecture
Introduction to Cryptography
Breaking an Encryption Scheme
Types of Cryptographic Function
Security Uses of Cryptography
Secret Key Cryptography
Uses of Secret Key Cryptography
Secret Key Authentication
Message Integrity with Secret Key Cryptography
Public Key Cryptography
Insecure Link Transmission with Public Key Cryptography
Authentication with public key Cryptography
Digital Signatures and Public Key Cryptography
Use of Digital Signatures with public key Cryptography
Hash and Message Digests in Detail
Some Math Behind Secret Key Cryptography
Some Math behind RSA Algorithm -I
Some Math behind RSA Algorithm -II
Combining Public and Secret Keys
Email: gcf@npac.syr.edu
Home Page: http://www.npac.syr.edu