Lecture Cryptography

Today we will be going over part 2 of the short lecture series on computer security which will be on cryptography. I will go over the Powerpoint below (you can download it to follow along on your computer).

pt2-cryptography

When the lecture is done, please copy/paste the following questions into a word processing doc (MS Word or Google Docs) and answer the the questions and save them on the server.

What is the process called that converts plaintext into ciphertext?
What is a cipher?

What is a ceasar cipher and how does it work?

What is the process called that decrypts a message without knowing the cipher or the key used to encrypt it?

Which key is used to decrypt the message?

Which key is distributed freely?

What is a digital signature used for?

Why do you think encryption is necessary?

Yes or No, Why do you think software companies should create backdoors for encryption to allow law enforcement to gain access to data for criminal investigations?

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s