Professional Documents
Culture Documents
LECTURE 2
Computer and Information
Security Fundamentals
(CSE 2203)
SEMESTER II (2021-2022)
- Assignment 1 (10%)
- Write up due
April 21st, 2022
- BONUS MARKS!!! Up to 5% for
participation in the Online
Tutorial Forum
and Asymmetric
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
a) it is authenticated
b) it contains the truth
c) it is verifiably unaltered
d) it contains the senders handwritten signature
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
Komisarczuk, P., Martin, K. & Alis, J. (2019), Information Security: Context and Introduction [Coursera course]
(Martin, 2009)
(Martin, 2009)
If Alice and Bob are to have any assurances about the security of
the communication that they have just exchanged then they must
ask themselves some serious questions.
●What questions should Alice be
thinking about before she sends
her information to Bob?
What is Cryptography?
What is Cryptography?
• Cryptography is the art and science
of designing techniques for secure
communication in the presence of
malicious third parties called
adversaries.
Cryptanalysis is a process
of finding weaknesses in
cryptographic algorithms
and using these
weaknesses to
decipher the ciphertext
without knowing the secret
key.
(OWASP, 2009)
(Martin, 2009)
(Martin, 2009)
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
http://www.themakeupgallery.info/hair/shaved/rushhour3.htm
(Martin, 2009)
(Martin, 2009)
(Martin, 2009)
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana What is a Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana A Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana A Symmetric Cryptosystem
Faculty of Natural Sciences
(Martin, 2009)
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana Public Key Cryptosystems
Faculty of Natural Sciences
In this case the encryption key and the decryption key must
be different. For this reason, public key cipher systems are
sometimes referred to as asymmetric cryptosystems.
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana Public Key Cryptosystems
Faculty of Natural Sciences
(Martin, 2009)
LECTURE 2 / CSE2203 / 2021-2022 / Lecturer: Sandra Khan
The University of Guyana Questions
Faculty of Natural Sciences
Individual Perspective:
Individuals have a right to use cryptography as they see fit.
Cryptography enables perceived rights such as privacy and freedom of
expression.
Government Perspective:
On the other hand, governments may wish to control crime and manage
issues of national security. They may try to do this by imposing certain
barriers and introducing other laws and regulations.
(Martin, 2009)
Required Readings:
Recommended Reading(s)
Stallings, W. (2007). Network security essentials: applications
and standards. Pearson Education India.
https://www.sans.org/security-resources/glossary-of-terms/
Department of Computer Science / CSE2203 / 2021-2022 / Lecturer: Sandra
Khan
The University of Guyana REFERENCES
Faculty of Natural Sciences