Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!

Similar presentations


Presentation on theme: "Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!"— Presentation transcript:

1 Computers in Society Encryption

2 Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!

3 Homework Did you do it? It’s your responsibility to be keeping up with the class home page and watch the homework assignments. I will accept this one up until next Tuesday but if it’s not in right now you’ve lost a letter grade.

4 Presentations Do you know when you’re on the schedule? Are you getting ready? Have you chosen a topic? If you’re not coming in to see me well before (at least a week!) you’re going to be in trouble. My job is to help you make the best presentation possible. But you have to come in and see me to get my help.

5 Homework There is no formal homework for next week BUT it’s time to get started on your term paper. I need a proposal by Thursday. Details in the wiki – click on “Term Paper”.

6 STORM WORM! Beware!

7 Privacy and Security Encryption Anonymity Trust

8 Encryption What is the difference between public key encryption and secret key encryption? What is the role of the random number in cryptography? If Alice used public key crypto, what will you have to know to send her a private message? What analogy does Wikipedia use for Public Key encryption?

9 Encryption Explain how this analogy corresponds to computer-based crypto What analogy corresponds to a digital signature? What is the basic problem of public key encryption? What is a certificate? How is a digital signature different from a real one?

10 Encryption What is the underlying algorithmic idea behind public key encryption? What mathematical function is behind RSA? Is popularity an indication of quality in encryption? What applications make use of cryptography? How does the example of a message from Bob to Alice using a private key work? What “danger” does Wikipedia mention?

11 Encryption What is a “brute force” attack on an encryption algorithm? Can we prove that an encryption system is not subject to attack? What is a “Man in the Middle” attack? What is key revocation? What are some examples of systems in which trust is of paramount importance?


Download ppt "Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!"

Similar presentations


Ads by Google