Chapter 8
Chapter 8
• Introduction to Cryptography
• Substitution Ciphers
• Transposition Ciphers
• One-Time Pads
• Two Fundamental Cryptographic
Principles
Need for Security
Some people who cause security problems and why.
An Introduction to Cryptography
The encryption model (for a symmetric-key cipher).
Transposition Ciphers
A transposition cipher.
One-Time Pads
An outline of
Rijndael.
AES (3)
• RSA
• Other Public-Key Algorithms
RSA
• Symmetric-Key Signatures
• Public-Key Signatures
• Message Digests
• The Birthday Attack
Symmetric-Key Signatures
• Certificates
• X.509
• Public Key Infrastructures
Problems with Public-Key
Encryption
A way for Trudy to subvert public-key encryption.
Certificates
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security
IPsec
A PGP message.
Web Security
• Threats
• Secure Naming
• SSL – The Secure Sockets Layer
• Mobile Code Security
Secure Naming
• Privacy
• Freedom of Speech
• Copyright
Anonymous Remailers
(a) Three zebras and a tree. (b) Three zebras, a tree, and the
complete text of five plays by William Shakespeare.