Author: Matt Bishop Given at: UC Davis Date: January 29, 2016 |
First slide (slide 1) Last slide (slide 33) PDF version |

Slide 1: Lecture for January 29, 2016

Slide 2: Cæsar’s Problem

Slide 3: Vigènere Cipher

Slide 4: Relevant Parts of Tableau

Slide 5: Useful Terms

Slide 6: Attacking the Cipher

Slide 7: One-Time Pad

Slide 8: Overview of the DES

Slide 9: How It Works

Slide 10: How It Works

Slide 11: Controversy

Slide 12: Undesirable Properties

Slide 13: Differential Cryptanalysis

Slide 14: DES Modes

Slide 15: CBC Mode Encryption

Slide 16: CBC Mode Decryption

Slide 17: Self-Healing Property

Slide 18: Current Status of DES

Slide 19: Overview of the AES

Slide 20: Basic Transformations

Slide 21: How It Works

Slide 22: How It Works

Slide 23: How It Works

Slide 24: Properties

Slide 25: Properties

Slide 26: Modes

Slide 27: Public Key Cryptography

Slide 28: Requirements

Slide 29: Diffie-Hellman

Slide 30: Algorithm

Slide 31: Example

Slide 32: RSA

Slide 33: Background

Slide 2: Cæsar’s Problem

Slide 3: Vigènere Cipher

Slide 4: Relevant Parts of Tableau

Slide 5: Useful Terms

Slide 6: Attacking the Cipher

Slide 7: One-Time Pad

Slide 8: Overview of the DES

Slide 9: How It Works

Slide 10: How It Works

Slide 11: Controversy

Slide 12: Undesirable Properties

Slide 13: Differential Cryptanalysis

Slide 14: DES Modes

Slide 15: CBC Mode Encryption

Slide 16: CBC Mode Decryption

Slide 17: Self-Healing Property

Slide 18: Current Status of DES

Slide 19: Overview of the AES

Slide 20: Basic Transformations

Slide 21: How It Works

Slide 22: How It Works

Slide 23: How It Works

Slide 24: Properties

Slide 25: Properties

Slide 26: Modes

Slide 27: Public Key Cryptography

Slide 28: Requirements

Slide 29: Diffie-Hellman

Slide 30: Algorithm

Slide 31: Example

Slide 32: RSA

Slide 33: Background