Outline for October 10, 2025
Reading:
text
, §10.2.3–10.5
Assignments:
Homework 1, due October 8; Project selection, due Oct 10
Class overview
Product ciphers
DES
DES modes
AES
Public-Key Cryptography
Basic idea: 2 keys, one private, one public
Cryptosystem must satisfy:
Given public key, computationally infeasible to get private key;
Cipher withstands chosen plaintext attack;
Encryption, decryption computationally feasible (
note
: commutativity not required)
Benefits: can give confidentiality or authentication or both
Use of public key cryptosystem
Normally used as key interchange system to exchange secret keys (cheap)
Then use secret key system (too expensive to use public key cryptosystem for this)
RSA
Provides both authenticity and confidentiality
Based on difficulty of computing totient, φ(
n
), when
n
is difficult to factor
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 235A, Computer and Information Security
Version of October 10, 2025 at 10:27AM
You can also obtain a PDF version of this.