Operating Systems Lecture Notes

2014 December 9 • Cryptographic Security


Outline

Cryptography

Cypher Example

Another Example

$ od -t x1z pt
0000000 68 65 6c 6c 6f 0a                                >hello.<

$ aescrypt2 0 pt ct key

$ od -t x1z ct
0000000 c6 25 e6 54 8c cf 34 df ab 51 c9 ba 88 04 d4 f6  >.%.T..4..Q......<
0000020 ab c9 d7 c7 5e 4d 9b 1d bf aa 9a 42 d4 98 7f 9a  >....^M.....B....<
0000040 61 3a 37 cb fe 26 ce 68 e1 79 d1 1c 4f 5b 31 6a  >a:7..&.h.y..O[1j<
0000060 d1 fc fc 50 be d8 15 7a ae 21 f8 d4 db 40 53 03  >...P...z.!...@S.<

$ aescrypt2 1 ct pt2 key

$ od -t x1z pt2
0000000 68 65 6c 6c 6f 0a                                >hello.<

$ 

Cryptographic Security

One-Time Pad

One-Time Pad Security

Symmetric-Key Cryptography

Symmetric Techniques

Example Symmetric Cypher

Example Use

Asymmetric-Key Cryptography

Breaking Cryptography

Problem Solved?

Passwords

Attacking Passwords

Defending Passwords

One-Time Passwords

Summary

References

Credits


This page last modified on 2011 October 9.

Creative
    Commons License