Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptology aka Cryptography Tim Cahill Ryan Church.

Similar presentations


Presentation on theme: "Cryptology aka Cryptography Tim Cahill Ryan Church."— Presentation transcript:

1 Cryptology aka Cryptography Tim Cahill Ryan Church

2 Project Plan Understand both public-key and symmetric cryptography Explore types of functions used: –hash Be able to create cryptographic programs. Learn the significance of key length. –Lower number bits = easier hacking DON’T FAIL!

3 Project Goals Compare the types of ciphers: –Similarities –Differences Cryptographic systems: –Public key, symmetric-key Purpose: –Security measures –Privacy –Authentication

4 Main Concepts Cryptology- the science of writing in secret code. Cipher- is an algorithm for performing encryption and decryption. Public-key cryptography- is a method for secret communication between two parties without requiring an initial exchange of secret keys. Symmetric-key algorithms- are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption. Caesar cipher- is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

5 References Spam and the ongoing battle for the inbox. Communications of the ACM, Volume 50, #2 (2007), pages 24-33. Joshua Goodman, Gordon V. Cormack, David Heckerman. Textbook: Invitation to computer science java version Edition 3, Schneider, copyright 07. pages 600-607 An overview of cryptography. Gary C. Kessler, may 1998 (23 January 2009). (website) www.garykessler.net/library/crypto.html#purpose


Download ppt "Cryptology aka Cryptography Tim Cahill Ryan Church."

Similar presentations


Ads by Google