CSE2203 - Lecture 2 - Introduction To Cryptography
CSE2203 - Lecture 2 - Introduction To Cryptography
LECTURE 2
Computer and
Information Security
Fundamentals
(CSE 2203)
SEMESTER II (2024-2025)
and Asymmetric
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
a) it is authenticated
b) it contains the truth
c) it is verifiably unaltered
d) it contains the senders handwritten signature
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
colleague?
●How do you sign a contract?
●Is this a more secure environment than the old office?
(Martin, 2009)
(Martin, 2009)
If Alice and Bob are to have any assurances about the security
of the communication that they have just exchanged then they
must ask themselves some serious questions.
What questions should Alice be thinking about before she sends
●
What is Cryptography?
What is Cryptography?
•Cryptography is the art and science of
designing techniques for secure
communication in the presence of
malicious third parties called adversaries.
Cryptanalysis is a process
of finding weaknesses in
cryptographic algorithms
and using these
weaknesses to
decipher the ciphertext
without knowing the secret
key.
(OWASP, 2009)
(Martin, 2009)
(Martin, 2009)
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
(Martin, 2009)
(Martin, 2009)
(Martin, 2009)
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
What is a Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
A Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
A Symmetric Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
A Symmetric Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
Public Key Cryptosystems
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2024-2025 / Lecturer: Sandra Khan
The University of Guyana
Questions
Faculty of Natural Sciences
Individual Perspective:
Individuals have a right to use cryptography as they see fit.
Cryptography enables perceived rights such as privacy and freedom of
expression.
Government Perspective:
On the other hand, governments may wish to control crime and manage
issues of national security. They may try to do this by imposing certain
barriers and introducing other laws and regulations.
(Martin, 2009)
Required Readings:
Recommended Reading(s)
Stallings, W. (2007). Network security essentials: applications and
standards. Pearson Education India.
https://www.sans.org/security-resources/glossary-of-terms/