Loading
Behram Faroogh
This is a live streamed presentation. You will automatically follow the presenter and see the slide they're currently on.
| Jan | 20 | Introduction |
| 27 | Security Principles | |
| Feb | 10 | Security Framework |
| 17 | Cyber Attacks & Threats | |
| 24 | Cyber Stealth | |
| Mar | 3 | Reading Week |
| 10 | Actors, Good & Bad | |
| 17 | Cryptography | |
| 24 | Encryption - Part 1 | |
| 31 | Group Presentation | |
| Apr | 7 | Encryption - Part 2 |
| 14 | Practicals |
| Jan | 26 | Quiz 1 | 10% |
| Feb | 2 | Quiz 2 | 10% |
| 17 | Quiz 3 | 10% | |
| Mar | 20 | Interim Test | 16% |
| 31 | Group Presentation | 18% | |
| Apr | 14 | Practicals | 18% |
| 17 | Final Exam | 18% | |
Cryptography is the practice of securing communication from unauthorized access or malicious attacks by converting plaintext (human-readable) information into an unreadable format called ciphertext. This is done through the use of mathematical algorithms and keys that allow only authorized parties to decode the message and access its original content.
Cryptography is used to protect sensitive information such as passwords, financial transactions, and government secrets. It is also used to verify the authenticity of digital documents and ensure the integrity of data transmission over networks.
Cryptography plays a critical role in modern cybersecurity and is essential in protecting against data breaches, identity theft, and cyber attacks.
Encryption
Decryption
Readable format
non-encrypted
Readable format
non-encrypted
Non-readable format
encrypted
Cipher An algorithm for transforming plain text to cipher text
Key Used to encrypt or decrypt the message
Keyspace The total number of all possible keys
Plain text The original message/information you want to secure
Decipher Convert the cipher text to plain text
Encipher Convert the plain text into cipher text
Decrypt Decipher
Encrypt Encipher
Cryptanalysis The study of deciphering cipher text without knowing the key
Cryptology Includes both cryptography and cryptanalysis