CPSC Home

Notes: Basics of Cryptology

We talked about some of the development of cryptology and how simple things like substitution ciphers are ineffective. These notes summarize key points about the cryptologic concepts which are widely used in today's networks.

AES

RSA Public Key Cryptography

Hash

Notes:

1. Sometimes the hash is longer than the message. The most common instance is passwords. To be safe, quality web sites do not store user passwords in databases. They store a hash (e.g. SHA-256 which produces a 256 bit hash) in the database. When the user types in the password, it is also hashed. The site compares the hashes. Thus if an attacker gains access to the password database, all they can do is try passwords to find one that produces the same hash. This is why using trivial/common passwords is such a bad idea.