CSC 2045 Week 06 Cryptography PDF
Document Details
Uploaded by DivineZebra9695
Red Rocks Community College
Tags
Summary
This document is a set of notes for a course called CSC 2045 Cryptography. It covers various aspects and techniques of cryptography, including different ciphers, encryption types, and modern cryptography. The notes also include links to Khan Academy resources.
Full Transcript
CSC 2045 CRYPTOGRAPHY OBJECTIVES AGENDA: WEEK 06 Explore how we have hidden 1. What is cryptography? secret messages through 2. Caesar Cipher history. 3. Frequency Fingerprint Assess your understanding 4. Polyalphabetic Ciphe...
CSC 2045 CRYPTOGRAPHY OBJECTIVES AGENDA: WEEK 06 Explore how we have hidden 1. What is cryptography? secret messages through 2. Caesar Cipher history. 3. Frequency Fingerprint Assess your understanding 4. Polyalphabetic Cipher of different encryption and 5. Enigma Cipher decryption techniques 6. Ciphers and Codes Apply symmetrical encryption 7. Modern cryptography: Keys techniques to crack 8. Modern cryptography: RSA the cipher WHAT IS CRYPTOGRAPHY? 1. Watch the video: Intro to Cryptography 2. Read the tutorial regarding the Need for Encryption 3. Define a. Cryptography b. Encryption c. Decryption CAESAR CIPHER Watch the video and then complete the exploration from Khan Academy Caesar Cipher Exploration FREQUENCY FINGERPRINT Watch the video and then complete the exploration from Khan Academy Frequency Fingerprint Exploration Work through the tutorial on Encryption, Decryption and Cracking to apply Caesar Cipher and Frequency Fingerprint SYMMETRIC ENCRYPTION TECHNIQUES Complete the sections noted from Khan Academy Symmetric Encryption Techniques ▪ Caesar Cipher ▪ Polyalphabetic Cipher Complete the 4 practice problems: Symmetric Encryption ANCIENT CRYPTOGRAPHY Complete the sections noted from Khan Academy The One Time Pad The Enigma Encryption Machine CIPHERS VS. CODES Work through the Khan Academy Tutorial: Ciphers vs. Codes Define 1. Cipher 2. Code 3. Plaintext CIPHERS Complete the next sections noted from Khan Academy Shift cipher ▪ Define Brute Force Attack XOR bitwise operation XOR and the one-time pad Complete the 7 practice problems: Bitwise operators MODERN CRYPTOGRAPHY: KEYS Watch the following sections noted from Khan Academy Public key cryptography: What is it? ▪ Work through the tutorial: Public key encryption ▪ Complete the 4 practice problems: Public Key Encryption ▪ Complete the 4 practice problems: Data Encryption Techniques The discrete logarithm problem Diffie-hellman key exchange MODERN CRYPTOGRAPHY: RSA Complete the next 5 sections noted from Khan Academy RSA encryption: Step 1 RSA encryption: Step 2 RSA encryption: Step 3 Euler's Totient Function RSA encryption: Step 4