Download presentation

Presentation is loading. Please wait.

Published byDarby Haseley Modified over 2 years ago

1
Week three!

2
8 groups of 2 6 rounds Ancient cryptosystems Newer cryptosystems Modern cryptosystems Encryption and decryptions Math Security and Performance 10 questions per round Each question is worth 1 point Bonus Bingo: Fill in 25 things from this class that you think are important. Mark them off if or when they come up.

5
1. This was the primary cryptosystem used by the Germans during World War II. 2. What was an advantage of the above cryptosystem? 3. What was a disadvantage of the above cryptosystem? 4. This was a cryptosystem used by the Americans during World War II that was never broken. 5. What was an advantage of the above cryptosystem? 6. What was a disadvantage of the above cryptosystem?

6
7. What cryptosystem was the first major cryptosystem to place its security just in the key? 8. This was the first algorithm released to the public that could enable Alice and Bob to establish cryptographic communication? 9. What algorithm relies on factoring for security? 10. What algorithm relies on the discrete logarithm problem for security?

7
1. This can replace RSA today. 2. This might some day RSA in the future. 3. This handles the vast majority of cryptography today. 4. In a war, if one side chooses to encrypt their information with AES, what should the other side choose? 5. In Quantum teleportation, what is “teleported”?

8
6. Name all public-key systems we have covered. 7. In Quantum computing, this describes the ability for a qubit to become 1 and 0 at the same time. 8. In Quantum computing, if two entangled qubits both have the value 0.5, what will they be when you observe them? 9. Will quantum computers make classical computers obsolete? 10. A 512 qubit quantum computer exists … why can’t it break 128-bit ECC?

11
S0123 011121314 115161718 219202122

12
Key size KeyspaceEncryption runtime Decryption runtime Resistant to Frequency Analysis?

13
The End

14
Created in the summer of 2013 by Dr. Jeffrey Beyerl for use in a cryptography class. This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.

Similar presentations

OK

8 groups of 2 5 rounds Basic Definitions Substitution Cryptosystems Math Tricky Questions Comparing Cryptosystems 10 questions per round.

8 groups of 2 5 rounds Basic Definitions Substitution Cryptosystems Math Tricky Questions Comparing Cryptosystems 10 questions per round.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Download ppt on harmonics in power system Ppt on resources utilization and development Powerpoint ppt on incredible india Seminar ppt on solid waste management Ppt on network theory of immigration Ppt on review of related literature and studies Ppt on windows mobile operating system Ppt on astronomy and astrophysics impact Ppt on indian equity market Jit ppt on manufacturing plants