Professional Documents
Culture Documents
Lecture 1 Applied Cryptography
Lecture 1 Applied Cryptography
Lecture 1 Applied Cryptography
Applied Cryptography
09/02/2023 1
Basics
• Cryptography
• Cryptanalysis
• Cryptology
09/02/2023 2
Why?
09/02/2023 3
Security violation Examples?
• https://
www.csoonline.com/article/2130877/the-biggest-data-
breaches-of-the-21st-century.html
• https://www.ekransystem.com/en/blog/real-life-exam
• https://
firewalltimes.com/netflix-data-breach-timeline/ples-in
sider-threat-caused-breaches
• https://
www.globalsign.com/en/blog/cyber-bank-robberies-c
ontribute-to-1-trillion-in-cybercrime-losses
09/02/2023 4
Security violation Examples?
09/02/2023 5
Forms of security?
• Data security
• Programming security
• Network security
• OS security
• Database security
09/02/2023 6
Syllabus
09/02/2023 7
Lab work
09/02/2023 8
Internal assessments
• IA 1
o Protocol Design for secure data transmission
o Group assignment
o Peer grading
• IA2
o Study of research/ Technical paper on Security Domain:
(Mutual Selection) and report submission
o Group assignment
o Peer grading
09/02/2023 9
Books
09/02/2023 10
Course Outcomes
09/02/2023 11
Questions?
09/02/2023 12