Document Details

DivineZebra9695

Uploaded by DivineZebra9695

Red Rocks Community College

Tags

cryptography encryption decryption security

Summary

This document is a set of notes for a course called CSC 2045 Cryptography. It covers various aspects and techniques of cryptography, including different ciphers, encryption types, and modern cryptography. The notes also include links to Khan Academy resources.

Full Transcript

CSC 2045 CRYPTOGRAPHY OBJECTIVES AGENDA: WEEK 06 Explore how we have hidden 1. What is cryptography? secret messages through 2. Caesar Cipher history. 3. Frequency Fingerprint Assess your understanding 4. Polyalphabetic Ciphe...

CSC 2045 CRYPTOGRAPHY OBJECTIVES AGENDA: WEEK 06 Explore how we have hidden 1. What is cryptography? secret messages through 2. Caesar Cipher history. 3. Frequency Fingerprint Assess your understanding 4. Polyalphabetic Cipher of different encryption and 5. Enigma Cipher decryption techniques 6. Ciphers and Codes Apply symmetrical encryption 7. Modern cryptography: Keys techniques to crack 8. Modern cryptography: RSA the cipher WHAT IS CRYPTOGRAPHY? 1. Watch the video: Intro to Cryptography 2. Read the tutorial regarding the Need for Encryption 3. Define a. Cryptography b. Encryption c. Decryption CAESAR CIPHER Watch the video and then complete the exploration from Khan Academy Caesar Cipher Exploration FREQUENCY FINGERPRINT Watch the video and then complete the exploration from Khan Academy Frequency Fingerprint Exploration Work through the tutorial on Encryption, Decryption and Cracking to apply Caesar Cipher and Frequency Fingerprint SYMMETRIC ENCRYPTION TECHNIQUES Complete the sections noted from Khan Academy Symmetric Encryption Techniques ▪ Caesar Cipher ▪ Polyalphabetic Cipher Complete the 4 practice problems: Symmetric Encryption ANCIENT CRYPTOGRAPHY Complete the sections noted from Khan Academy The One Time Pad The Enigma Encryption Machine CIPHERS VS. CODES Work through the Khan Academy Tutorial: Ciphers vs. Codes Define 1. Cipher 2. Code 3. Plaintext CIPHERS Complete the next sections noted from Khan Academy Shift cipher ▪ Define Brute Force Attack XOR bitwise operation XOR and the one-time pad Complete the 7 practice problems: Bitwise operators MODERN CRYPTOGRAPHY: KEYS Watch the following sections noted from Khan Academy Public key cryptography: What is it? ▪ Work through the tutorial: Public key encryption ▪ Complete the 4 practice problems: Public Key Encryption ▪ Complete the 4 practice problems: Data Encryption Techniques The discrete logarithm problem Diffie-hellman key exchange MODERN CRYPTOGRAPHY: RSA Complete the next 5 sections noted from Khan Academy RSA encryption: Step 1 RSA encryption: Step 2 RSA encryption: Step 3 Euler's Totient Function RSA encryption: Step 4

Use Quizgecko on...
Browser
Browser