Computer Security CSE 543
Popular in Course
Popular in Computer Science and Engineering
This 0 page Class Notes was uploaded by Libby Kuhlman on Sunday November 1, 2015. The Class Notes belongs to CSE 543 at Pennsylvania State University taught by Staff in Fall. Since its upload, it has received 26 views. For similar materials see /class/233115/cse-543-pennsylvania-state-university in Computer Science and Engineering at Pennsylvania State University.
Reviews for Computer Security
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/01/15
CSE 543 Computer Security Lecture 3 Principles September 4 2007 URL httpwwwcsepsuedutiaegercse543f07 PENNSIAIE Data Encryption Standard DES Introduced by the US NBS I C INITIALPERIIVIUTATION gt Signaled the beginning of 39 1 the modern area of cryptography II Block cipher Fixed sized input at s h h b 8 byte input and a 8 byte fag T Russian I key 56bits8 parity bits 63 C 11Wr ERSE INITIAL PERMUTATION 3 i OUTPUT CSE543 Computer and Network Security Fall 2007 Professor Jaeger Cryptanalysis of DES PM DES has an effective 56bit key length Wiener 1000000 85 hours never built July 17 1998 the EFF DES Cracker which was built for less than 250000 lt 8 days January 19 1999 DistributedNet wEFF 22 hours and 15 minutes over many machines We all assume that NSA and agencies like it around the world can crack recover key DES in milliseconds What now Give up on DES PENNSTATE Variants of DES DESX XOR with separate keys SObits Linear cryptanalysis Triple DES three keys 112bits keys k1 k2 k8 c E D E p k1 k2 k3 k1 k2 k3 PENNStAtE Advanced Encryption Standard AES Result of international NIST bakeoff between cryptographers Intended as replacement for DES Rijndael pronounced Rhinedall Currently implemented in many devices and software but not yet fully embraced Cryptography community is actively vetting the the theory and implementations stay tuned CSE543 Computer and Network Security Fall 2007 Professor Jaeger PENNSTATE Public Key Cryptography Public Key cryptography Each key pair consists of a public and private component k public key k private key D Ep kt k39 I0 D Ep k39 kt I0 Public keys are distributed typically through public key certificates Anyone can communicate secretly with you if they have your certificate Eg SSL base web commerce
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'