In the news CNS Lecture 5 • Over 1,000 laptops missing from Commerce Dept since ’01 • Massive growth in organized crime targeting home PCs Digital Encryption Standard (DES) • DNS attack in China takes 180,000 web sites offline Other Feistel ciphers (Lucifer, blowfish, CAST) • Purdue Univ. notifying students of possible data breach Non-Feistel (IDEA, RCx) • Stolen laptop holds data on 50,000 GE employees Blocking (ECB,CBC,OFB,CTR)
assignments 4 and 5 and 6
CNS Lecture 5 - 2
ciphers You are here …
Attacks & Defenses Cryptography Applied crypto • use substitution and permutation (SPN) • • Risk assessment • • assume algorithm known Random numbers SSH • strength based on key • Viruses •Hash functions •PGP • resist cryptanalysis/statistical analysis • Unix security – diffusion -- spread statistics of plaintext into many bits of ciphertext • • authentication