Invitation to Computer Science 5 th Edition. Chapter 8 Information Security

Size: px
Start display at page:

Download "Invitation to Computer Science 5 th Edition. Chapter 8 Information Security"

Transcription

1 Invitation to Computer Science 5 th Edition Chapter 8 Information Security

2 CIA Triad of Information Security Ensuring that data can be modified only by appropriate mechanisms Ensuring that data is protected from unauthorized access The degree to which authorized users can access information for legitimate purposes Invitation to Computer Science, 6e 2

3 Information Security Rick Analysis Determining the nature and likelihood of the risks to key data Planning for information analysis requires risk analysis Goal is to minimize vulnerability to threats that put a system at the most risk Invitation to Computer Science, 6e 3

4 Cryptography Cryptography The field of study related to encoded information (comes from Greek word for "secret writing") Encryption The process of converting plaintext into ciphertext Decryption The process of converting ciphertext into plaintext Invitation to Computer Science, 6e 4

5 Cryptography Encryption plaintext message ciphertext message Decryption Encrypted(Information) cannot be read Decrypted(Encrypted(Information)) can be Invitation to Computer Science, 6e 5

6 Cryptography Cipher An algorithm used to encrypt and decrypt text Key The set of parameters that guide a cipher Neither is any good without the other Invitation to Computer Science, 6e 6

7 Symmetric-Key Cryptography The general idea behind symmetric-key cryptography. Alice can send a message to Bob over an insecure channel with the assumption that an adversary, Eve, cannot understand the contents of the message by simply eavesdropping on the channel. The original message from Alice to Bob is referred to as plaintext; the message that is sent through the channel is referred to as the ciphertext. Alice uses an encryption algorithm and a shared secret key. Bob uses a decryption algorithm and the same secret key. Invitation to Computer Science, 6e 7

8 Invitation to Computer Science, 6e 8

9 Cryptography Substitution cipher: A cipher that substitutes one character with another Caesar cipher A substitution cipher that shifts characters a certain number of positions in the alphabet Transposition ciphers A cipher that rearranges the order of existing characters in a message in a certain way (e.g., a route cipher) Invitation to Computer Science, 6e 9

10 Caesar cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Substitute the letters in the second row for the letters in the top row to encrypt a message Ex: Encrypt(COMPUTER) gives FRPSXWHU Decrypt(Encrypt(COMPUTER)) gives COMPUTER Why is this called the Caesar cipher? What is the key? Invitation to Computer Science, 6e 10

11 Transposition Cipher T O D A Y + I S + M O N D A Y Write the letters in a row of five, using '+' as a blank. Encrypt by starting spiraling inward from the top left moving counter clockwise Ex: Encrypt(TODAY IS MONDAY) gives T+ONDAYMYADOIS+ Decrypt by recreating the grid and reading the letters across the row What is the key? The key are the dimension of the grid and the route used to encrypt the data Invitation to Computer Science, 6e 11

12 Cryptanalysis Cryptanalysis The process of decrypting a message without knowing the cipher or the key used to encrypt it Substitution and transposition ciphers are easy for modern computers to break To protect information more sophisticated schemes are needed Invitation to Computer Science, 6e 12

13 Modern symmetric-key ciphers Modern ciphers normally use a combination of substitution, transposition and some other complex transformations to create a ciphertext from a plaintext. Modern ciphers are bit-oriented (instead of character-oriented). The plaintext, ciphertext and the key are strings of bits. Example DES (Data Encryption Standard) AES Invitation to Computer Science, 6e 13

14 DES DES is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST) in DES has been the most widely used symmetric-key block cipher since its publication. Invitation to Computer Science, 6e 14

15 DES (continued) Symmetric encryption algorithm Designed for digital data: plaintext is binary string Uses 64-bit binary key (56 bits actually used) Sixteen rounds of same series of manipulations Decryption uses same algorithm, keys in reverse Fast and effective, but requires shared key, 56 bits is too small for modern technology Invitation to Computer Science, 6e 15

16 DES (continued) DES manipulations Split string Duplicating some bits Omit some bits Permute bit order Combine bit strings with XOR (exclusive or) Invitation to Computer Science, 6e 16

17 Invitation to Computer Science, 6e 17

18 AES The Advanced Encryption Standard (AES) is a symmetric-key block cipher published by the US National Institute of Standards and Technology (NIST) in 2001 in response to the shortcoming of DES. Invitation to Computer Science, 6e 18

19 Asymmetric-key Cryptographs Two distinctive keys in asymmetric-key cryptography: a private key and a public key. The key for encryption and the key for decryption are different Person A makes an encryption key public (public key) Anyone can encrypt a message using the public key and send it to A Only A has the decryption key (private key) and can decrypt the message Example RSA Invitation to Computer Science, 6e 19

20 Figure 16.7 The general idea behind asymmetric-key cryptography Invitation to Computer Science, 6e 20

21 RSA RSA key creation Pick 2 large prime numbers: p and q Compute n = p q, and m = (p-1) (q-1) Choose large number e at random, so that e and m are relatively prime (no common factors except 1) Find unique value d, between 0 and m, such that (e d) modulo m = 1 Public key = (n, e), Private key = d Invitation to Computer Science, 6e 21

22 RSA (continued) Example: Choose p = 7, q = 11 n = 7 11 = 77, and m = 6 10 = 60 Choose e = 13 (60 = 2*2*3 * 5, 13=1*13) The corresponding d = 37 (13 37 modulo 60 = 1) Therefore, public key = (77, 13), Private key = 37 Invitation to Computer Science, 6e 22

23 RSA (continued) RSA encryption: Given public key (n, e) Convert message to integer P Calculate C = P e modulo n RSA decryption: Given private key d Calculate C d modulo n Invitation to Computer Science, 6e 23

24 RSA (continued) RSA encryption, example: Given public key (77, 13) Convert message to integer P = 5 Calculate C = 5 13 modulo 77 = 26 RSA decryption: Given private key 37 Calculate modulo 77 = 5 Invitation to Computer Science, 6e 24

25 Public/Private Keys Digital signature Data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity of the message Digital certificate A representation of a sender's authenticated public key used to minimize malicious forgeries Invitation to Computer Science, 6e 25

26 Computer Security Authentication credentials Information users provide to identify themselves for computer access User knowledge such as name, password, PIN Smart card with embedded memory chip used for identification Biometrics human characteristics such as fingerprints, retina or voice patterns Invitation to Computer Science, 6e 26

27 Computer Security Malicious Code A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm: stands alone, targets network resources Trojan horse: disguised as benevolent resource Virus: self-replicating Logic bomb: set up to execute at system event Invitation to Computer Science, 6e 27

28 Computer Security Security Attacks An attack on the computer system itself Password guessing: obvious Phishing: trick users into revealing security information Spoofing: malicious user masquerades as authorized user Back door: unauthorized access to anyone who knows it exists Invitation to Computer Science, 6e 28

29 Computer Security Buffer overflow: defect that could cause a system to crash and leave the user with heightened privileges Denial-of-service: attach that prevents authorized user from accessing the system Man-in-the-middle: network communication is intercepted in an attempt to obtain key data Have you ever experienced one of these? Invitation to Computer Science, 6e 29

30 Invitation to Computer Science, 6e 30

31 Mal-Ware Virus: attaches itself to a program or file and causes damage of hardware, software or files Worm: has the capability to spread itself out to everyone listed in your address book Trojans horse: will appear to be useful software at first glance but will actually do damage once installed or run on your computer Invitation to Computer Science, 6e 31

32 Mal-Ware (con t) Some Famous Computer Virus, Worm, or Trojan Horse Invitation to Computer Science, 6e 32

33 Web Transmission Security E-commerce requires secure transmission of names, passwords, credit card numbers Web protocols: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) Client-server applications Server provides certificate of authentication and server s public key Client sends its DES key, encrypted using RSA Data is sent encrypted by the (now shared) DES key Invitation to Computer Science, 6e 40

34 Invitation to Computer Science, 6e 41

35 Secure Socket Layer (SSL) Invitation to Computer Science, 6e 42

36 Secure Socket Layer (SSL) Invitation to Computer Science, 6e 43

37 Secure Socket Layer (SSL) SSL includes two sub-protocols: the SSL Record Protocol and the SSL Handshake Protocol. Record Protocol - defines the format used to transmit data. Handshake Protocol - using the Record protocol to exchange messages b/t an SSL-enable server and an SSL-enable client. Invitation to Computer Science, 6e 44

38 Secure Socket Layer (SSL) 客戶端認證 (Client Authentication) 伺服端認證 (Server Authentication) 加密連線 (Encrypted Connection) Invitation to Computer Science, 6e 45

39 SSL Record Protocol Operation Application Data abcdefghijklmn Fragment abcdef ghijk lmn Compress Add MAC generate MD5 by using HASH Encrypt Add SSL Record Header Invitation to Computer Science, 6e 46

40 SSL 封包格式 SSL 訊息封裝 ( 一 ) IP Header (a) 變更密文規格協定 (b) 警告協定 (c) 握手協定 (d) 紀錄協定 TCP Header 1 Type = 20 Type = 21 Type =22 Type =23 1 Byte Change SSL Message 1 1 Byte Alter Alert Level Desc. 1 Hand. Type Length 3 >= 0 Bytes Content >= 0 Bytes 0,16, 20 Major Minor HTTP,..., Message Length MAC Version Version (or Compress) 加密編碼 Invitation to Computer Science, 6e 47

41 SSL 訊息封裝 ( 二 ) 握手協定之命令型態 訊息 ( 命令 ) 型態參數 ( 內容 ) hello_request client_hello server_hello certificate server_key_exchange certificate_request server_done certificate_verify client_key_exchange finished 無版本 亂數 會議 ID 加密套件 壓縮方法版本 亂數 會議 ID 加密套件 壓縮方法一連串的 X.509v3 憑證內容鑰匙材料 數位簽章憑證型態 認證中心無數位簽章鑰匙材料 數位簽章雜湊值 Invitation to Computer Science, 6e 48

42 SSL 訊息封裝 ( 三 ) 紀錄層訊息封裝 上層資料 ( 如 HTTP) Application data 分段處理 Fragment Fragment Fragment 壓縮處理 compress compression_method 加入認證標頭 compress MAC client/server_write_mac_secret 加密處理 Encrypt client/server_write_key client/server_write_iv 加入 SSL 紀錄標頭 H Encrypt SSL 協定包裝 TCPInvitation TCP 協定包裝 Header TCP to Computer Message Science, 6e 49 如 https: tcp/443 埠口

43 11-5 SSL 會議連結識別 會議連結 (Session Connection):Session ID 使用於 SSL Record Layer 的參數 Session Identifier Peer Certificate Compression Method Cipher Spec Master Secret Is Re-useable Invitation to Computer Science, 6e 50

44 SSL 握手協定 ( 一 ) 協商步驟 1. 交換 Hello 訊息, 協議演算法, 並檢視是否有 Session ID 可重複使用 2. 交換鑰匙材料, 及製作 前置主秘鑰 (Pre-master Secret) 3. 交換 身份憑證 4. 利用 Pre-master Secret 製作 Master Secret 5. 將安全參數登錄於 Session Connection 6. 保證協議當中未受到駭客攻擊 Invitation to Computer Science, 6e 51

45 客戶端 伺服端 第一階段 (1) client_hello (2) server_hello 雙方利用 Hello 訊息互相傳送相關安全參數 SSL 握手 協定 ( 二 ) 第二階段 (3) certificate * (4) server_key_exchange * (5) certificate_request * 伺服端傳送憑證 交換鑰匙與要求對方憑證 協商階段 第三階段 (6) server_done (7) certificate * (8) client_key_exchange (9) certificate_verify * 客戶端傳送憑證 交換鑰匙與要求確認憑證 第四階段 (10) [change_cipher_spec] (11) finished (12) [change_cipher_spec] (13) finished 客戶端要求變更密文規格及完成協議 伺服端要求變更密文規格及確認完成協議 SSL/TLS 安全連線依照安全機制傳輸應用層資 Record Protocol 料 Invitation to Computer Science, 6e 52 備註 : 有星號 (*) 表示選項訊息

46 網路環境 - 防火牆 Invitation to Computer Science, 6e 53

SSL VPN User Manual (SSL VPN 連線使用手冊 )

SSL VPN User Manual (SSL VPN 連線使用手冊 ) SSL VPN User Manual (SSL VPN 連線使用手冊 ) 目錄 前言 (Preface) 1. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Windows ( 中文版 ):... 2 2. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Linux ( 中文版 )... 7 3. ACMICPC 2018

More information

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000 Start SU-6808 EMMC Programmer V.0bd7 [ ]Link PC / [ ]Menu [ ] >.Select project.make new project.engineer mode.reset counter 5.Link to PC [ ] PC disconnected PC connected Select project SEM0G9C_A.prj Terminate

More information

Management Information Systems SECURING INFORMATION SYSTEMS

Management Information Systems SECURING INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION GLOBAL EDITION Chapter 8 SECURING INFORMATION SYSTEMS VIDEO CASES Case 1: IBM Zone Trusted Information Channel (ZTIC) Case 2: Open ID and Web Security Instructional

More information

Oxford isolution. 下載及安裝指南 Download and Installation Guide

Oxford isolution. 下載及安裝指南 Download and Installation Guide Oxford isolution 下載及安裝指南 Download and Installation Guide 系統要求 個人電腦 Microsoft Windows 10 (Mobile 除外 ) Microsoft Windows 8 (RT 除外 ) 或 Microsoft Windows 7 (SP1 或更新版本 ) ( 網上下載 : http://eresources.oupchina.com.hk/oxfordisolution/download/index.html)

More information

Frame Relay 訊框中繼 FRSW S0/0 S0/1

Frame Relay 訊框中繼 FRSW S0/0 S0/1 Frame Relay 訊框中繼 將路由器設定為訊框中繼交換器以進行 frame relay 實驗 : 首先練習設定兩個埠的 frame relay switch FRSW S0/0 S0/1 介面 S0/0 介面 S0/1 102 201 DLI 102 DLI 201 Router(config)# hostname FRSW FRSW(config)# frame-relay switching

More information

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式 On a desktop or notebook computer Installing Acrobat Reader to read the course materials The Course Guide, study units and other course materials are provided in PDF format, but to read them you need a

More information

Preamble Ethernet packet Data FCS

Preamble Ethernet packet Data FCS Preamble Ethernet. packet Data FCS Destination Address Source Address EtherType Data ::: Preamble. bytes. Destination Address. bytes. The address(es) are specified for a unicast, multicast (subgroup),

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統.

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入網站網址 http://portal.hkct.edu.hk (HKCT 之教職員, 學生 ) http://portal.ctihe.edu.hk (CTIHE 之教職員,

More information

EZCast Wire User s Manual

EZCast Wire User s Manual EZCast Wire User s Manual Rev. 2.01 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

EZCast Docking Station

EZCast Docking Station EZCast Docking Station Quick Start Guide Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Docking Station contains the cutting-edge EZCast technology, and firmware upgrade will be provided

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 點選 登入 Click 登入 Login (You have to login before purchasing.) 步驟 2: 若已是會員請填寫會員帳號 密碼, 點選 登入 若非會員請點選 註冊 If you are the member of PB+, Please login. If not, please register.

More information

EZCast Wire. User s Manual. Rev. 2.00

EZCast Wire. User s Manual. Rev. 2.00 EZCast Wire User s Manual Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide BTC, EMPREX 6309URF III Quick Installation Guide Hardware Installation 1. Plug the dongle receiver connector into your available USB port on PC. 2. Make sure the batteries of the keyboard and mouse are

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 已是會員請點選 登入, 選擇 2016 WTA 臺灣公開賽 Taiwan Open tickets Step1:If You are the member, please Click 登入 Click to the column: 2016 WTA 臺灣公開賽 Taiwan Open tickets Click 登入

More information

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB Ubuntu 是新一代的 Linux 作業系統, 最重要的是, 它完全免費, 不光是作業系統, 連用軟體都不必錢 為什麼要裝在 USB 隨身碟上? 因為, 你可以把所有的軟體帶著走, 不必在每一台電腦上重新來一次, 不必每一套軟體裝在每一台電腦上都要再一次合法授權 以下安裝方式寫的是安裝完整的 Ubuntu- 企業雲端版本 V. 11.10 的安裝過程, 若是要安裝 Desktop 版本, 由於牽涉到

More information

Figure 1 Microsoft Visio

Figure 1 Microsoft Visio Pattern-Oriented Software Design (Fall 2013) Homework #1 (Due: 09/25/2013) 1. Introduction Entity relation (ER) diagrams are graphical representations of data models of relation databases. In the Unified

More information

Quick Installation Guide for Connectivity Adapter Cable CA-42

Quick Installation Guide for Connectivity Adapter Cable CA-42 9235663_CA42_1_en.fm Page 1 Monday, September 13, 2004 11:26 AM Quick Installation Guide for Connectivity Adapter Cable CA-42 9235645 Issue 1 Nokia, Nokia Connecting People and Pop-Port are registered

More information

InTANK ir2771-s3 ir2772-s3. User Manual

InTANK ir2771-s3 ir2772-s3. User Manual InTANK ir2771-s3 ir2772-s3 User Manual » InTANK...1» InTANK ir2771-s3 & ir2772-s3 產品使用說明... 10 V1.1 Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2771-s3

More information

SOHORAID ST8-TB3 User Manual

SOHORAID ST8-TB3 User Manual SOHORAID ST8-TB3 User Manual » ST8-TB3 User Manual...1 1. Environmental Requirements...1 2. Product Appearance and Packaging Content...1 3. Hardware Requirements and Precautions...2 4. Hardware Installation...3

More information

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval Product Definition C-MING Product Semi-finished Product OEM/ODM Product Component USB Interface Data Encryption Lock USB 資料加密鎖 Specifications for Approval Approval Manager Issued By Revision History Revision

More information

Patent Status Summary

Patent Status Summary Patent Status Summary 2015 Taking Taking Energy Energy Further Further Summary Tri Cascade Patent 1 2 3 4 5 6 Identification Detection System For Power Consumption Of Electric Appliance 電器用電量身份識別偵測系統 Digital

More information

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03 Amos Introduction 2009 OB Workshop: Structural Equation Modeling Changya Hu, Ph.D. NCCU 2009/07/02- 2 Contents Amos Basic Functions Observed Variable Path Analysis Confirmatory Factor Analysis Full Model

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016 全面強化電路設計與模擬驗證 Addi Lin / Graser 2 / Sep / 2016 Agenda OrCAD Design Solution OrCAD Capture 功能應用 OrCAD Capture CIS 介紹 OrCAD PSpice 模擬與驗證 OrCAD Design Solution Powerful and Widely Used Design Solution Front-to-Back

More information

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers Chapter 7 Digital Arithmetic and Arithmetic Circuits Signed/Unsigned Binary Numbers Signed Binary Number: A binary number of fixed length whose sign (+/ ) is represented by one bit (usually MSB) and its

More information

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS. Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL CS 393 Network Security Nasir Memon Polytechnic University Module 12 SSL Course Logistics HW 4 due today. HW 5 will be posted later today. Due in a week. Group homework. DoD Scholarships? NSF Scholarships?

More information

Registering ( 註冊新帳號 )

Registering ( 註冊新帳號 ) 證券市場發展季刊線上審稿系統註冊流程指南 Registering ( 註冊新帳號 ) Unregistered visitors to a journal can normally register as a Reader, Author, and/or Reviewer. Journal Managers are able to remove the ability for visitors to

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Chapter 4. Channel Coding and Error Control

Chapter 4. Channel Coding and Error Control Chapter 4 Channel Coding and Error Control Adapted from class notes by Prof. Leszek T. Lilien, CS, Western Michigan University and Prof. Dharma P. Agrawal & Qing-An Zeng, University of Cincinnati Most

More information

CLAD 考前準備 與 LabVIEW 小技巧

CLAD 考前準備 與 LabVIEW 小技巧 CLAD 考前準備 與 LabVIEW 小技巧 NI 技術行銷工程師 柯璟銘 (Jimmy Ko) jimmy.ko@ni.com LabVIEW 認證 Certified LabVIEW Associate Developer (LabVIEW 基礎認證 ) Certified LabVIEW Associate Developer LabVIEW 全球認證 40 題 (37 題單選,3 題複選

More information

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 SQL 的資料定義語言 本章內容 建立資料表 修改資料表 刪除資料表 FOREIGN KEY 外鍵條件約束與資料表關聯性 2 資料定義語言可分為下列三種 : SQL 的資料定義語言 CREATE TABLE 指令 : 用來建立一個基底關聯表, 和設定關聯表相關的完整性限制 CREATE VIEW 指令 : 用來建立一個視界,

More information

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere Citrix CloudGateway aggregate control all apps and data to any device, anywhere Agenda 1. What s Cloud Gateway? 2. Cloud Gateway Overview 3. How it works? What s Cloud Gateway? It s all about the apps

More information

InTANK ir2623-s3 User Manual

InTANK ir2623-s3 User Manual InTANK ir2623-s3 User Manual » InTANK...1» InTANK ir2623-s3 產品使用說明...12 V1.0 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the IR2623-S3 Series. Before using

More information

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version]

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version] 外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System [ 中文版 ] [English Version] 線上申請流程說明 申請系統網址 : http://schwebap.nccu.edu.tw/zeweb/exgstdapply/ 1. 建立新帳號 : 請輸入姓名 生日 email 做為未來登入系統用

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

SOHOTANK PD3500+ User Manual

SOHOTANK PD3500+ User Manual SOHOTANK PD3500+ User Manual » SOHORAID SR2 Series User Manual.3» SOHORAID SR2 系列產品使 用說明.. 14 2 Introduction Thank you for purchasing STARDOM products. This manual will introduce the SOHOTANK PD3500+ Series.

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Transport Layer Security (TLS) Advanced Features University of Tartu Spring 2016 1 / 16 Client Server Authenticated TLS ClientHello ServerHello, Certificate, ServerHelloDone

More information

Chapter 4: Securing TCP connections

Chapter 4: Securing TCP connections Managing and Securing Computer Networks Guy Leduc Chapter 5: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section

More information

VB 拼圖應用 圖形式按鈕屬性 資科系 林偉川

VB 拼圖應用 圖形式按鈕屬性 資科系 林偉川 VB 拼圖應用 資科系 林偉川 圖形式按鈕屬性 Style 屬性 0 ( 標準外觀 ),1( 圖片外觀 ) Picture 屬性 圖形檔案 (VB6) image 屬性 圖形檔案 (VB.NET) Left=Top=0 Width=2052,Height=2052 共有九張圖 1.jpg 9.jpg Form1 執行時視窗為最大化 Windowstate 設為 2 2 1 執行結果 3 path$

More information

Operating manual. LawMate WN7911B-ZZ. WiFi Module V 01

Operating manual. LawMate WN7911B-ZZ. WiFi Module V 01 羅美國際有限公司 /LawMate International Co., Ltd. 台北市內湖區文湖街 60 巷 34 號 3 樓 /3F, No.34, Lane 60, Wenhu St., Taipei, Taiwan TEL:+886 2-8797-5728 / FAX:+886 2-8797-5727 Operating manual Operating manual LawMate WN7911B-ZZ

More information

InTANK ir2622 User Manual

InTANK ir2622 User Manual InTANK ir2622 User Manual » InTANK...1» InTANK ir2622 產品使用說明... 12 V1.2 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2622 Series. Before using

More information

Twin API Guide. How to use Twin

Twin API Guide. How to use Twin Twin API Guide How to use Twin 1 目錄 一 Cycle Job------------------------------------------------------------------------------------P3 二 Twin Action Table-----------------------------------------------------------------------P4-5

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

Virtual Private Network and Security. Michael Tsai 2016/05/11

Virtual Private Network and Security. Michael Tsai 2016/05/11 Virtual Private Network and Security Michael Tsai 2016/05/11 But, first, a bit about Transport Layer + Port No. Multiplexing & Demultiplexing Socket: port 80 Web Server (Apache) FTP Your Network Device

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved.

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved. RENESAS BLE 實作課程 2016-01-21 Jack Chen Jack.chen@victron.com.tw Victron Technology CO., LTD AGENDA CS+ & Renesas Flash Programmer 安裝 3 Renesas Flash Programmer 燒錄介紹 6 CS+ 介面介紹 11 CS+ 開啟 Project & 使用教學 14

More information

The transformation relationship between defense enterprise architecture and C4ISR system architecture

The transformation relationship between defense enterprise architecture and C4ISR system architecture The transformation relationship between defense enterprise architecture and C4ISR system architecture Dr. Meng-chyi Harn 報告人 : 韓孟麒博士德明財經科技大學資訊科技系 C4ISR 研究中心 Introducing Takming Outline Introduction Fundamental

More information

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner.

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 2: 填寫會員資料 Step 2:Fill out the membership form. Name ID No. Male/female Foreigner

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

香港中文大學學生會計算機科學系會 圖書清單

香港中文大學學生會計算機科學系會 圖書清單 香港中文大學學生會計算機科學系會 圖書清單 100 Theory 120 CGI 140 Visual Basic 160 Other Programming Book 101 Program budgeting and benefit-cost analysis 102 Introduction to Algorithms 103 Introduction to Algorithms 104 Data

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

UNIX Basics + shell commands. Michael Tsai 2017/03/06

UNIX Basics + shell commands. Michael Tsai 2017/03/06 UNIX Basics + shell commands Michael Tsai 2017/03/06 Reading: http://www.faqs.org/docs/artu/ch02s01.html Where UNIX started Ken Thompson & Dennis Ritchie Multics OS project (1960s) @ Bell Labs UNIX on

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005 Chapter 7: Security From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4 Introduction Security policies Provide for the sharing of resources within specified limits

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

// 範例 4-1: 連結資料庫 (connectdb.php) <?php mysql_connect("localhost", "student", "Asia2013"); mysql_select_db("student");?>

// 範例 4-1: 連結資料庫 (connectdb.php) <?php mysql_connect(localhost, student, Asia2013); mysql_select_db(student);?> // 範例 4-1: 連結資料庫 (connectdb.php) mysql_connect("localhost", "student", "Asia2013"); mysql_select_db("student"); // 範例 4-2: 以 PHP 建立資料表 (gbcreate.php) $aa=" create table gb ( gbprikey integer auto_increment

More information

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned)

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned) Chapter 7 Digital rithmetic and rithmetic Circuits igned/unsigned inary Numbers igned inary Number: binary number of fixed length whose sign (+/ ) is represented by one bit (usually M) and its magnitude

More information

Raspbian 網路設定. Wired & Wireless 2017/10/11 第 6 章 -

Raspbian 網路設定. Wired & Wireless 2017/10/11 第 6 章 - 內容 第 6 章 - 雲端硬碟系統實作 - 無線 / 有線網路設定 Raspbian 網路設定 Raspbian 無線網路 Raspbian 無線網路 - 相關命令 Raspbian 識別無線驅動 USB 網卡 安裝無線網卡 - 驅動程式 安裝無線網卡 Edimax EW-7811Un- 驅動安裝 ( 編譯好的 Dr) Raspbian 網路設定 Interface eth0 Wired & Wireless

More information

Information is EVERYTHING 微軟企業混和雲解決方案. November 24, Spenser Lin. Cloud Infra Solution Sales, Microsoft Taiwan

Information is EVERYTHING 微軟企業混和雲解決方案. November 24, Spenser Lin. Cloud Infra Solution Sales, Microsoft Taiwan Information is EVERYTHING 微軟企業混和雲解決方案 November 24, 2016 Spenser Lin Cloud Infra Solution Sales, Microsoft Taiwan Value to business Applications and services drive future IT business value Efficiency Innovation

More information

Version Control with Subversion

Version Control with Subversion Version Control with Subversion 指導教授郭忠義 邱茂森 95598051 1 Table of contents (1) Basic concepts of subversion (1)What is Subversion (2)Version Control System (3)Branching and tagging (4) Repository and Working

More information

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP)

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) 陳瑞奇 (J.C. Chen) 亞洲大學資訊工程學系 Adapted from class notes by Prof. M.J. Irwin, PSU and Prof. D. Patterson, UCB 4.10 Instruction-Level

More information

Mid-term EXAM. 11/14/2009

Mid-term EXAM. 11/14/2009 Mid-term EXAM. 11/14/2009 1. (15%) Data Compression a) Encode the following characters using Huffman coding with the given frequencies: A(12), B(8), C(9), D(20), E(31), F(14), G(8) (-1 point if theree

More information

COVER SHEET AND REVISION HISTORY REV. DCN NUMBER DATE HISTORY ORIGINATOR

COVER SHEET AND REVISION HISTORY REV. DCN NUMBER DATE HISTORY ORIGINATOR 203530 28 01/04/2012 1/11 Title: 膠類材料規格 SPECIFICATION OF EPOXY MATERIAL COVER SHEET AND REVISION HISTORY REV. DCN NUMBER DATE HISTORY ORIGINATOR 16 09001014 11/27/2009 Modify Appendix 1. Viscosity for

More information

微軟新一代私有雲服務. 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本. Jason Chou Architect. Nov 7, 2013

微軟新一代私有雲服務. 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本. Jason Chou Architect. Nov 7, 2013 微軟新一代私有雲服務 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本 Jason Chou Architect Nov 7, 2013 Agenda Cloud OS Vision Windows Server 2012 R2 New Features Windows Azure Pack Overview Success Case High-performance

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect

More information

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 傳統視訊會議 : 視訊會議解決方案 以硬體設備為主, 內建專屬視訊會議軟體, 要增加連線數量就必須加購昂貴的 MCU Server, 整套設備的價格多在數百萬之譜 軟體式視訊會議 : 在現有的基礎設備上, 強化整合通訊功能 (UC), 再結合視訊會議功能 (VC, Video Conference), 對於公司的網路系統或是通訊系統做更有效率的運用

More information

The notice regarding Participation Ways of our global distributor video conference on Feb. 5.

The notice regarding Participation Ways of our global distributor video conference on Feb. 5. The notice regarding Participation Ways of our global distributor video conference on Feb. 5. On Feb.5, 2010 Los Angeles time, between 5:00 PM - 7:00 PM, we will convene an important global distributor

More information

User s Manual. Rev. 1.04

User s Manual. Rev. 1.04 EZCast Wire User s Manual Rev. 1.04 Introduction Thanks for choosing EZCastseries product, the EZCast Wire is the latest innovation of EZCast. It is based on popular EZCastapp and modified for Wired connection

More information

Security Protocols and Infrastructures. Winter Term 2010/2011

Security Protocols and Infrastructures. Winter Term 2010/2011 Winter Term 2010/2011 Chapter 4: Transport Layer Security Protocol Contents Overview Record Protocol Cipher Suites in TLS 1.2 Handshaking Protocols Final Discussion 2 Contents Overview Record Protocol

More information

User Guide. 3D Camera

User Guide. 3D Camera User Guide 3D Camera Over View Weeview's SID Camera offers high resolution 3D video and 3D photo, and live stream in 3D with compatible streaming software. Viewers can truly re-live and re-define the experience.

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

WHD0110 (RoHS) SmartRouter IAD

WHD0110 (RoHS) SmartRouter IAD WHD0110 (RoHS) SmartRouter IAD Quick Guide Version released: 1.0 i TABLE OF CONTENTS Before You Use... 3 Unpacking... 3 Chapter 1: Overview... 4 Physical Outlook... 4 Chapter 2 : System Requirement and

More information

EAP330. Enterprise Access Point

EAP330. Enterprise Access Point EAP330 Enterprise Access Point Quick Installation Guide Copyright Notice This document is protected by USA copyright laws and other laws. Besides, the document is the property of 4IPNET, INC. You may not

More information

Global Certification Corp.

Global Certification Corp. Report No.: E450201-01 GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC Applicant Address

More information

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation 輕鬆打造 Web 2.0 入口網站 2007 IBM Corporation 議程 Web 2.0 新特性一覽 Web 2.0 入口網站主題開發 用戶端聚合技術 PortalWeb2 主題 開發 AJAX portlets 程式 總結 JSR 286 及 WSRP 2.0 對 AJAX 的支援 AJAX 代理 用戶端 portlet 編程模型 Web 2.0 特性一覽 WP 6.1 提供的 Web

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

用於網頁版權保護的資訊隱藏方法. A Steganographic Method for Copyright Protection of Web Pages

用於網頁版權保護的資訊隱藏方法. A Steganographic Method for Copyright Protection of Web Pages 用於網頁版權保護的資訊隱藏方法 A Steganographic Method for Copyright Protection of Web Pages Ya-Hui Chang( 張雅惠 ) and Wen-Hsiang Tsai( 蔡文祥 ) Department of Computer & Information Science National Chiao Tung University

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

微處理機系統 吳俊興高雄大學資訊工程學系. February 21, What are microprocessors (µp)? What are the topics of this course? Why to take this course?

微處理機系統 吳俊興高雄大學資訊工程學系. February 21, What are microprocessors (µp)? What are the topics of this course? Why to take this course? 微處理機系統 吳俊興高雄大學資訊工程學系 February 21, 2005 processor, central processing unit (CPU) A silicon chip which forms the core of a microcomputer The heart of the microprocessor-based computer system Concept of what

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

RTL8710BN Build and Debug Environment Setup IAR

RTL8710BN Build and Debug Environment Setup IAR Build and Debug Environment Setup IAR This document illustrates how to build Realtek low power Wi Fi software under IAR SDK environment. Table of Contents 1. Introduction...3 2. How to get IAR...3 3. Ameba

More information

Increase Productivity and Quality by New Layout Flow

Increase Productivity and Quality by New Layout Flow Increase Productivity and Quality by New Layout Flow Jonathan / Graser 16 / Oct / 2015 Design Process Introduction CONSTRAINTS PLACEMENT FANOUT BREAKOUT ROUTING DELAY (ATE) NET-GROUP Topology & Delay Physical

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information