Outline for May 27, 2022
Reading:
text
: , §54, 55
Assignments:
Lab Exercise 2, due June 2
Announcements
Network Security
Cryptographic considerations
Firewalls
Cryptography
Symmetric cryptography
Transposition cipher
Substitution cipher
Product cipher
AES
Public key cryptography
Requirements for public (encryption) and private (decryption) keys
RSA
Provides confidentiality, integrity, authentication, non-repudiation
Cryptographic hashes and digital signatures
Malware
Trojan horses
Computer viruses
Computer worms
Bacterium, rabbits
Logic bombs
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
[email protected]
ECS 150, Operating Systems
Version of May 28, 2022 at 9:39PM
You can also obtain a PDF version of this.