×

### Let's log you in.

or

Don't have a StudySoup account? Create one here!

×

or

## Intro to Analysis of Algorithm

by: Laurianne Mante

24

0

10

# Intro to Analysis of Algorithm CSCI 350

Marketplace > Bucknell University > ComputerScienence > CSCI 350 > Intro to Analysis of Algorithm
Laurianne Mante

GPA 3.54

Staff

These notes were just uploaded, and will be ready to view shortly.

Either way, we'll remind you when they're ready :)

Get a free preview of these Notes, just enter your email below.

×
Unlock Preview

COURSE
PROF.
Staff
TYPE
Class Notes
PAGES
10
WORDS
KARMA
25 ?

## Popular in ComputerScienence

This 10 page Class Notes was uploaded by Laurianne Mante on Saturday October 3, 2015. The Class Notes belongs to CSCI 350 at Bucknell University taught by Staff in Fall. Since its upload, it has received 24 views. For similar materials see /class/218091/csci-350-bucknell-university in ComputerScienence at Bucknell University.

×

## Reviews for Intro to Analysis of Algorithm

×

×

### What is Karma?

#### You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 10/03/15
CSC1350 Spring 2006 Slide Set 12 PublicKey Cryptography Background Why Encrypt 0 Communication model Alice and Bob send messages across a channel Problem Eavesdroppers Codes versus Cyphers A code hides information by replacing each word of the text with with a character or sequence of characters The process of replacing text with code words is encoding A cipher hides information by replacing each character by another A key provides the speci c information needed to use a general cipher rule for encipherin g We will focus on ciphers Encryption Encryption is the process of converting text into enciphered or encoded form The process of converting encrypted text back to the original plain text is decryption The encryptiondecryption process depends on a secret The secret may be the key used in the encryption process but could also include the details of the encryption process Note that the secret is not the transmitted text The Computational Perspective Mathematically encryption is done via an invertible function e and decryption is done via its inverse d e39l We assume that we have programs E and D that compute e and 0 respectively 0 Given a message M the encrypted version is EM We can decrypt this using DEM1 Elam1 M Desired Encryption Properties Often E and D take the secret as an argument though it could also be built into the computations What computational properties do we want E and D to have E and D should be easy to compute if you know the secret D should be hard to compute if you don t know the secret Examples Using Ciphers 0 We can write encryption functions for the following ciphers shift characters a fixed amount throught the alphabet cyclical shift apply a sequence of maps Enigma use a randomized map onetime pad XOR a random byte with each character 0 How good are these approaches Attacks Consider the following ways to attack the ciphers on the previous page brute force try all single character shifts statistical analysis use letter and word frequencies plain text attack compare known plain text with encrypted version of that text Onetime pad holds up against these attacks note that we need real randomness not C rand functionl But coordination is an issue Other Attacks 0 Spoo ng issue authentication Denial of service 0 Message modi cation Problems with Shared Secrets 0 Key transmission 0 Key security Dealing with multiple parties

×

×

### BOOM! Enjoy Your Free Notes!

×

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

## Why people love StudySoup

Jim McGreen Ohio University

#### "Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Anthony Lee UC Santa Barbara

#### "I bought an awesome study guide, which helped me get an A in my Math 34B class this quarter!"

Steve Martinelli UC Los Angeles

#### "There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Parker Thompson 500 Startups

#### "It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!
×

### Refund Policy

#### STUDYSOUP CANCELLATION POLICY

All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email support@studysoup.com

#### STUDYSOUP REFUND POLICY

StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here: support@studysoup.com

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to support@studysoup.com