Lecture 1
15-827 Security and Cryptography Lecture 1
.
Outline
.
Overview of Cryptography and Security: Building Blocks and Layers
.
Physical Security Risks: Natural and Malicious
.
Malicious Attacks
.
More Malicious Attacks
.
More Malicious Attacks
.
More Malicious Attacks
.
More Malicious Attacks
.
Principles Behind Physical Security
.
Risk Analysis: Simplistic Example (from Rivest'95)
.
Risk Analysis (Simplistic Example)
.
Risk Analysis (Simplistic Example)
.
Cryptography Basics
.
Cryptology
.
Cryptosystem (pictorially)
.
What's Secret?
.
Desired goals for A wants to send B a message M.
.
Security Metrics
.
Kinds of Cryptoanalysis Attacks
.
Unconditional security (against ciphertext -only attacks)
.
Example: One-Time Pad
.
More on One-Time Pads
.
Unconditional Authenticity
.
Unconditional Authenticity ( cont'd )
.
Concrete Example
.
Computational Security
.
DES
.
DES criticisms and realities
.
DES
.
Can we strengthen DES?
.
Can We Strengthen DES?
.
DES properties ( pp . 256-258)
.
Cryptanalysis of DES
.
What About Those S-Boxes?
.
Block Cipher Modes of Operation (Section 7.2.2)
.
Electronic Codebook Mode (ECB)
.
Cipher Block Chaining (CBC)
.
Cipher Feedback (CFB) and Output Feedback (OFB) Modes
.
Modes of Operation Depicted
.
Other Block Ciphers
.
Next Time
.
Back to
Lectures
Heather L. Marko
Last Modified: September 1998