Tom Kelliher, CS 325
Feb. 8, 2010
Same reading.
Choose presentation topics. Grading criteria.
Perl/CGI lab.
More Cryptography.
One key. Key distribution and management issues. Private key cryptography.
Two keys: private and public. Public key cryptography.
The result is not necessarily ``better.''
This forces the cryptanalyst to have access to large amounts of cipher text.
This property makes it harder to understand the relationship between the plain text and the cipher text.
Fast; no latency.
Poor diffusion; possibly little confusion.
Slower; latency.
Excellent diffusion and confusion.
Simple permutation scheme using ``tolerant'' as key: toleranbcdfgh...
(Use key and follow up with remaining letters.)
For each plaintext character, use the next random number to select the permutation to apply.
Keeping the pads in synch.