Tom Kelliher, CS 325
Sept. 19, 2011
Discussion of individual Perl/CGI assignment and project.
This technique was known to IBM and the NSA much earlier.
Requires two plaintext, ciphertext pairs.
Strength is . ``Meet in the middle'' defeats one stage.
Strength is just .
Why a decrypt stage? Consider the case -- single DES.
Vetted by NSA.
Key lengths of 192 and 256 are approved for US Top Secret level data.
Decreasing the number of rounds weakens AES. To date, best known attacks are with 7, 8, 9 rounds, respectively. Too close for comfort?
What do we mean by breaking encryption?
General principles:
Also: .
Elements:
Key distribution?
E for privacy, D for authentication.
How can ``someone'' securely send you a document?
How do I convince you of my identity?
How do I securely send you a document, convincing you it's from me?
Requirements for secure information transfer between two parties. Information should be:
Digital certificate:
What is the goal of SSL? How does it work?