Cybersecurity

FNT106
Day 7
Cryptography
March 17, 2023
Behram Faroogh
Class Schedule
| Jan | 20 | Introduction |
| 27 | Security Principles | |
| Feb | 10 | Security Framework |
| 17 | Cyber Attacks & Threats | |
| 24 | Cyber Stealth | |
| Mar | 3 | Reading Week |
| 10 | Actors, Good & Bad | |
| 17 | Cryptography | |
| 24 | Encryption - Part 1 | |
| 31 | Group Presentation | |
| Apr | 7 | Encryption - Part 2 |
| 14 | Practicals |
Test Schedule
| Jan | 26 | Quiz 1 | 10% |
| Feb | 2 | Quiz 2 | 10% |
| 17 | Quiz 3 | 10% | |
| Mar | 20 | Interim Test | 16% |
| 31 | Group Presentation | 18% | |
| Apr | 14 | Practicals | 18% |
| 17 | Final Exam | 18% | |

Cryptography
Cryptography
Cryptography is the practice of securing communication from unauthorized access or malicious attacks by converting plaintext (human-readable) information into an unreadable format called ciphertext. This is done through the use of mathematical algorithms and keys that allow only authorized parties to decode the message and access its original content.
Cryptography is used to protect sensitive information such as passwords, financial transactions, and government secrets. It is also used to verify the authenticity of digital documents and ensure the integrity of data transmission over networks.
Cryptography plays a critical role in modern cybersecurity and is essential in protecting against data breaches, identity theft, and cyber attacks.

Real world Cryptography

Why we need to be cryptic?
Steps involved
- Transforming plain language
- Using an algorithm
- To make it unreadable to anyone (cipher)
- Except those possessing the key

A tale of 2 friends (and a spy)

A tale of 2 friends (and a spy)

Key Encryption (Symmetric)
Encryption
Decryption

Cryptographic workflow
Readable format
non-encrypted
Readable format
non-encrypted
Non-readable format
encrypted
Terms in Cryptography
Cipher An algorithm for transforming plain text to cipher text
Key Used to encrypt or decrypt the message
Keyspace The total number of all possible keys
Plain text The original message/information you want to secure
Decipher Convert the cipher text to plain text
Encipher Convert the plain text into cipher text
Decrypt Decipher
Encrypt Encipher
Cryptanalysis The study of deciphering cipher text without knowing the key
Cryptology Includes both cryptography and cryptanalysis
Cybersecurity

FNT106
End of Day 7
Cryptography
March 17, 2023
Behram Faroogh
FNT106.07
By Behram Faroogh
FNT106.07
Winter 2023 - FNT106 - Day 2
- 12