Lecture 11: October 18, 2019
Reading: text, §8.4–8.5, 10.1–10.2
Due: Lab 1, due October 18, 2019; Homework 2, due October 21, 2019
- Greetings and felicitations!
- Puzzle of the Day
- Role-based access control
- Break-the-glass policies
- Cryptography
- Codes vs. ciphers
- Attacks: ciphertext only, known plaintext, chosen plaintext
- Types: substitution, transposition
- Symmetric Cryptography
- Monoalphabetic (simple substitution): f(a) = a + k mod n
- Example: Caesar (shift) cipher with k = 3, RENAISSANCE → UHQDLVVDQFH