Introduction to Computer Security Programming Assignment #2 Onsite Test.

Slides:



Advertisements
Similar presentations
On-the-fly Verification of Erasure-Encoded File Transfers Mike Freedman & Max Krohn NYU Dept of Computer Science.
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
Data encryption with big prime numbers
Public Key Encryption Algorithm
Numbers on the Internet
Library Class. Online Encyclopedia Current: updated every year Quick and easy Books in our reference section 2009 is our newest Do not need a computer.
Setting Up Mastering Physics Online Homework!! Course Enrollment due by Fri 9/6/13, 5 pm Extra practice problems due Sat 9/14/13, 2 am.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Introduction to Computer Security Programming Assignment #1 Online Test.
Operating Systems Concepts Professor Rick Han Department of Computer Science University of Colorado at Boulder.
Cryptography at The University of South Carolina Douglas B. Meade
Threads Chapter 4. Modern Process & Thread –Process is an infrastructure in which execution takes place  (address space + resources) –Thread is a program.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Introduction To C++ Programming 1.0 Basic C++ Program Structure 2.0 Program Control 3.0 Array And Structures 4.0 Function 5.0 Pointer 6.0 Secure Programming.
Encryption Methods By: Michael A. Scott
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Public-Key Cryptology An Asymmetrical Approach to Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Michael Smith Center for Technology Access & Training (CETAT)
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Computer Networks Ivan Marsic Rutgers University Chapter 7 – Network Security Chapter 8 – Network Monitoring Chapter 9 – Internet Protocols APPENDIX: Probability.
Computer Security coursework 2 Dr Alexei Vernitski.
MobilBank Card account control through a mobile phone.
MobilBank Card account control through a mobile phone.
Implementing RSA Encryption in Java
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
PHY 107 – Programming For Science. Announcements  Slides, activities, & solutions always posted to D2L  Note-taking versions before class, for those.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
Everything is an object (CH-2) Manipulating Objects with References. Manipulating Objects with References. String s; String s = “IS2550” String s = new.
Technical Overview. Project Overview Document Library Document List Index TransmittalsPlanning.
Cole David Ronnie Julio. Introduction Globus is A community of users and developers who collaborate on the use and development of open source software,
Ch Chapter 4 Basic Data Types and Variables 4.1 Basic Data Types In C TABLE 4.1 Introduction to Basic Data Types in C Type SizeDescription char 1.
MAT 1000 Mathematics in Today's World Winter 2015.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Cryptography Against Physical Attacks Dana Dachman-Soled University of Maryland
Assignment 1 tutorial. Assignment 1 Programming part: – Socket programming: a chat room application – Individual assignment – Deadline 20 th Oct 2015.
Introduction to Number Theory
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
SILO File Upload & Feedback System By Marie Harms State Library of Iowa August 18 & 19, 2010.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© Synopsys IP Licensing Recommendations for P1735 Rev 4/16/12.
PV204 Security technologies
Chapter 4 – Fundamental Data Types
Outline of implementation
Navigate to the Kaspersky global product updates page.
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Threads Chapter 4.
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
ВОМР Подмярка 19.2 Възможности за финансиране
Споразумение за партньорство
Introduction to Elliptic Curve Cryptography
Create engaging training with text pictures and video!
Exercise 1: Let’s Communicate - Decrypt The message
Duet Acting Assignment
Cryptography Lecture 25.
Computer Network Information Center, Chinese Academy of Sciences
How to Use Charm Crypto Lib
CS Introduction to Operating Systems
Presentation transcript:

Introduction to Computer Security Programming Assignment #2 Onsite Test

When (choose one) – 2011/03/29 Tue. 18:30pm~21:30pm – 2011/04/01 Fri. 18:30pm~21:30pm Where – EC 330

Online Judge Submit your source code – C/C++ (GCC 4.2.1) – JAVA (version 6.0 update 7) No BigInteger & BigDecimal class Test-data & Result – Standard I/O – Format is fixed

Problem 3 problems (develop your large number library) – Multiplication of two large numbers – Modular exponentiation of large numbers – RSA encryption Message is divided into blocks of 5 chars. Each block is encoded into a large number. Details will be announced at this test