Slide 1

Slide 1 text

Cripto-Códigos Matemáticas para resguardo de información. Ken Bauer Associate Professor of Computing Tecnológico de Monterrey in Guadalajara

Slide 2

Slide 2 text

2 Key Terms today ● Cryptography and Cryptanalysis ● Cipher (cryptographic algorithm), key ● Plaintext and Ciphertext ● Symmetric vs. Asymmetric Encryption ● Conventional (Simple) Cryptography ● Public key Cryptography ● Digital Certificates ● Levels of Trust

Slide 3

Slide 3 text

3 Bruce Schneier Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and SourceCode in C. “There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.”

Slide 4

Slide 4 text

4 Encryption and Decryption (symmetric) Source: http://www.ncsa.illinois.edu/People/ncsairst/pgp/IntroToCrypto.pdf

Slide 5

Slide 5 text

5 Encryption and Decryption (Asymmetric) Source: http://www.ncsa.illinois.edu/People/ncsairst/pgp/IntroToCrypto.pdf

Slide 6

Slide 6 text

6 Caesar Cipher Source: https://www.instructables.com/id/Basics-of-Cryptography-Caesar-Cipher/

Slide 7

Slide 7 text

7 Caesar’s Cipher Exercises 1) Cipher with shift +3: Hola Javier 2) Cipher with shift +12: Me gusta mucho pizza 3) Decode with shift +5: ltytufwnx 4) Decode with shift +21: adiyevhznwjiy 5) Caesar cipher using frequency analysis: espntaspcsldmppymczvpy 6) Caesar cipher using frequency analysis: kgyezuhxkgq

Slide 8

Slide 8 text

8 Privacy and Security https://youtu.be/XY5l8NHaGEI

Slide 9

Slide 9 text

9 More Tools 1) Create your Keybase account. 2) Validate your Keybase account. 3) Send an encrypted message to Ken via Keybase.

Slide 10

Slide 10 text

10 Bibliography ● “An Introduction to Cryptography”, Network Associates, Inc., 1998: http://www.ncsa.illinois.edu/People/ncsairst/pgp/IntroToCrypto.pdf ● “Basics of Cryptography: Caesar Cipher”, https://www.instructables.com/id/Basics-of-Cryptography-Caesar-Cipher/ ● “Caesar Ciphers: An Introduction to Cryptography”, Purdue University, 2006/2007, https://gencyber.utulsa.edu/wp-content/uploads/2016/10/Ceasar-Ciphers-An-Introduction-to-Cryptography-lesson-plan-for-math.pdf

Slide 11

Slide 11 text

11 References ● Slides at: https://speakerdeck.com/kenwbauer ● “Yet Another Introductory Number Theory Textbook”, Jonathan A. Poritz: https://poritz.net/jonathan/share/yaintt.pdf ● Privacy Tools: https://www.privacytools.io/ ● EFF Privacy: https://www.eff.org/issues/privacy ● Bruce Schneier: https://www.schneier.com/ ● Brian Krebs: https://krebsonsecurity.com/ ●