Lecture 11: October 18, 2019

Reading: text, §8.4–8.5, 10.1–10.2
Due: Lab 1, due October 18, 2019; Homework 2, due October 21, 2019


  1. Greetings and felicitations!
  2. Puzzle of the Day
  3. Role-based access control
  4. Break-the-glass policies
  5. Cryptography
    1. Codes vs. ciphers
    2. Attacks: ciphertext only, known plaintext, chosen plaintext
    3. Types: substitution, transposition
  6. Symmetric Cryptography
    1. Monoalphabetic (simple substitution): f(a) = a + k mod n
    2. Example: Caesar (shift) cipher with k = 3, RENAISSANCEUHQDLVVDQFH

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of October 17, 2019 at 5:27PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh