Class 6: Introduction to Cryptography


This lecture is a companion to Sections 2.1 to 2.4 in the textbook

CS 4235 Information Security Crypto


4 Responses to “Class 6: Introduction to Cryptography”

  1. Nigel Says:

    When we were talking about authorization, and multi-level security, would SELinux be a good example of multilevel security?

  2. Karthik Rangarajan Says:

    SELinux, is for the most part, trying to reach the goals of a system that was provided by a bunch of people a long time back. The system was called Multics. The system can’t even be built with the present hardware, but the people who came up with it had brilliant ideas in their head.

    A good paper talking about it.

  3. Ian Axelrod Says:

    What was not delved into deeply enough, in my opinion, was the importance people play in cryptosystems. There is a xkcd comic, which explains an ideal situation as thought up by a cryptographer, versus what might happen in real life. Here’s the article:

    People are the weakest links in security, whether automated or not.

    • Karthik Rangarajan Says:

      “People are the weakest links in security”

      Couldn’t agree with you more. There are professors who call this the “Layer 8” problem. By the way, has anyone heard about the encryption scheme Microsoft used for Microsoft Mail? Someone in Google told me about it, it’s hilarious. The fun part is that Yahoo still uses the same thing for “encrypting” the chat archives it stores in the computer.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: