Lecture 12 Outline
Reading
: §8.3–8.5, 10.1–10.2
Due
: Homework 3, due on May 9, 2018 at 11:59pm; Lab 2, due on May 7, 2018 at 11:59pm
Greetings and felicitations!
Originator-controlled access control
Role-based access control
Cryptography
Codes vs. ciphers
Attacks: ciphertext only, known plaintext, chosen plaintext
Types: substitution, transposition
Symmetric Cryptography
Monoalphabetic (simple substitution):
f
(
a
) =
a
+
k
mod
n
Example: Caesar with
k
= 3,
RENAISSANCE
→
UHQDLVVDQFH
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
[email protected]
ECS 153, Computer Security
Version of April 26, 2018 at 8:22PM
You can also obtain a PDF version of this.