Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Modern Cryptography: An Introduction to Data Privacy and Integrity in the Digital World - , Study notes of Cryptography and System Security

The lecture notes for cs 6260 applied cryptography, a course taught by alexandra (sasha) boldyreva at georgia tech. The notes cover the basics of cryptography, its history, and its applications in data privacy and integrity in the digital world. Students are encouraged to answer some questions about their background and motivation for taking the class. The lecture introduces the concepts of symmetric-key and asymmetric-key encryption, data authenticity and integrity, and the difference between perfect secrecy and shannon secrecy. The document also includes some theorems about the security of onetimepad encryption.

Typology: Study notes

Pre 2010

Uploaded on 08/16/2009

koofers-user-2z3-2
koofers-user-2z3-2 🇺🇸

10 documents

1 / 4

Toggle sidebar

Related documents


Partial preview of the text

Download Modern Cryptography: An Introduction to Data Privacy and Integrity in the Digital World - and more Study notes Cryptography and System Security in PDF only on Docsity! CS 6260 Applied Cryptography Alexandra (Sasha) Boldyreva Lecture 1: Introduction, perfect (Shannon) secrecy. All the information is at www.cc.gatech.edu/classes/AY2005/cs6260_spring/ Office hours: CCB 254, Tu 4:45-5:45 pm, W 2-3 pm Please answer the following questions: Your name Your department/major, Ph.D., M.S. or B.S., year in the program Why you are taking this class (required, curious, etc.) Your plans after the graduation (industry, research, etc.) Cryptography is very old and very new Crypto is an ancient discipline Recall Julius Caesar, Enigma,... Crypto as a science (modern cryptography) has short but exciting history Most of it happened in the last 30 years! This course will be an introduction to modern cryptography data privacy data authenticity (it came from where it claims) data integrity (it has not been modified on the way) in the digital world Main goals of cryptography are Who used some cryptography recently? 1 2 3 4 Crypto is used by most people when Doing on-line shopping and banking Talking on a cell phone Watching satellite TV and pay-per-view movies Players and settings S R A 1. Symmetric-key setting K K Players and settings S R A 2. Asymmetric (public)-key setting skr pkr ... ... R pkr ... ... pkr Goals and primitives setting goal symmetric-key asymmetric-key data privacy symmetric (secret-key) encryption asymmetric (public-key) encryption data authenticity/ integrity message authentication code (MAC) digital signature scheme 5 6 7 8
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved