CPSC 418/MATH 318 Introduction to Cryptography
Course Technicalities, Symmetric Cryptosystems Renate Scheidler
Department of Mathematics & Statistics Department of Computer Science University of Calgary
Week 1
Email Comic Share on Facebook Tweet Share on LinkedIn Comments 144 Buy
×Close
Share September 08, 2019's comic on:
Facebook Twitter
Outline
1
Course Technicalities
2
Overview of Cryptography Cryptography Within Information Security
3
Symmetric Cryptography
4
Cryptanalysis Cryptographic Attacks Cryptographic Security
Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 1 1 / 35
Motivation
Cryptography (from the Greek) — ‘hidden writing’ What would you like to see in a secure electronic assignment submission system? Want submission: confidential so no one can steal it (confidentiality) protected so no one can alter it (data integrity) authentic so no one can impersonate creator (entity authentication) safe from intrusion on disk (access control) safe from denial by instructor or TA (non-repudiation) This course will work toward solutions for ensuring all of these. Examples
- f complete systems at end of the course.
Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 1 2 / 35 Course Technicalities
Course Details
Course web page: //people.ucalgary.ca/~rscheidl/418 Course info, slides, assignments, handouts, course schedule, useful links Link can be found on the D2L page (combined page for CPSC 418 and MATH 318) Delivery: Lectures (MWF 2:00-2:50 pm, ST 148) For CPSC 418 only: individual tutorials once a week (5 tutorials, all Mon & Wed afternoons) For CPSC 418 only: common tutorial (Wed 18:00-18:50, ICT 102) Read through the course website this week.
Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 1 3 / 35