General
About CSC
Organisation

People
Process for CSC hosting
School Models
Role of Local Organisers
Other Roles

Participants
Past Schools

2004 2005 2006 2007 2008 2009 2010 2011

Diploma at CSC
Sport at CSC
Inverted CSCs

iCSC05 iCSC06 iCSC08 iCSC10 iCSC11

Special schools

School@chep06


Inverted School 2011

3-4 March 2011


CSC2011

 

CSC2011 Overview

Practical Information
Programme
Schedule
Lecturers
Participants
Organizers

 
Examination results
How to apply
 
CSC-Live

inverted CERN School of Computing 2011 3-4 March 2011, CERN

Programme Overview

 

All questions

Virtualization and Clouds

Computer Security

Hot Topics in Software Engineering Details of All Lectures

Schedule

Lecturers

Lecturer Bios

 

Mentors

Printable Version

Theme: Computer Security
Lecture:
Understanding Cryptography: From Caesar to Public-Key

A few questions addressed in the lecture

Thursday 3 March

15:30 - 16:25

Lecture 4

Understanding Cryptography: From Caesar to Public-Key

Nicola Chiapolini
Universität Zürich - Switzerland

Presentation
In this lecture we start by explaining a selection of simple cryptographic algorithms as well as the methods to attack them. We then try and show how these basic algorithms evolved over time into the modern ones and give simple examples of how he recent algorithms work.

As a illustration, we will  turn to one of the most challenging  exercise given at CSC2010 in the "Writing Secure software" class (that is the "HTML-riddle problem" ) in order to show how this knowledge can to solve the problem posed.

Benefits
After this lecture, the attendees should not only understand how modern cryptographic algorithms developed, but also master their basic principles.

Audience
This lecture targets everyone who wants to understand what is going on when using encryption or who is  interested in riddles..

 Pre-requisite
This lecture can be followed by anyone. The ability to understand simple programs will help nevertheless.

 

 

 
Questions
  • Are modern encryption systems really secure?

  • What lessons after 2000 years of encryption?

  • Ever wondered how asymmetric ciphers work?

  • How can you keep your secrets?

All the answers at  iCSC Lecture 4: Understanding Cryptography: From Caesar to Public-Key

 

iCSC
 
New Handouts
All on iCSCs
News
Registration
Handouts
Programme
Schedule
All questions

Virtualization and Clouds

Lecture1

Lecture2

Lecture3

All theme lectures

Computer Security

Lecture4

Hot Topics in Software Engineering

Lecture5

Lecture6

All theme lectures

 
All iCSC Lectures
 
FAQ
 
Social event

Feedback: Computing (dot) School (at) cern (dot) ch
Last update: Monday, 18. June 2012 09:43

Copyright CERN