Lecture 12 Outline

Reading: §8.3–8.5, 10.1–10.2
Due: Homework 3, due on May 9, 2018 at 11:59pm; Lab 2, due on May 7, 2018 at 11:59pm
  1. Greetings and felicitations!
  2. Originator-controlled access control
  3. Role-based access control
  4. Cryptography
    1. Codes vs. ciphers
    2. Attacks: ciphertext only, known plaintext, chosen plaintext
    3. Types: substitution, transposition
  5. Symmetric Cryptography
    1. Monoalphabetic (simple substitution): f(a) = a + k mod n
    2. Example: Caesar with k = 3, RENAISSANCEUHQDLVVDQFH

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 153, Computer Security
Version of April 26, 2018 at 8:22PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh