SlideShare a Scribd company logo
L.O: STUDENTS WILL BE
ABLE TO EXPLAIN PUBLIC
KEY ENCRYPTION.
40-45 minutes
DO NOW:
READ Unit 2 Lab 6: Encryption,
Page 3
Public Key Encryption:
• the methods discussed
so far all have a basic
weakness: the
encryption method or
key needs to be kept
secret. But keeping the
key private is almost as
hard as keeping the
message private.
In 1976 Ron Rivest, Adi
Shamir, and Len Adleman
devised an ingenious method
(now known as RSA) that
allows a person to announce
publicly how anyone can
encode a message to him so
that only he is able to
decipher it.
The information, which
is given away to
everybody, is called the
public key. The
information which is
needed for deciphering
(the private key) is
known only by the
person for whom the
message is intended.
If Bob wants to send Alice
a secret message, he
enciphers it with Alice's
public key. Then no one
else can decipher it, even
knowing her public key.
Only her private key can
undo the encryption, and
you can't figure out the
private key from the public
key.
For You To Do
1. It may seem incredible that
Alice can make her encryption
key public and still no one
except her can decrypt her
message. The RSA method
relies on some mathematics
and on some limitations on
the speed of current
computers. Read "Secrecy
Changes Forever" (Blown to
Bits pages 178-181) to
understand some of how this
works
Here is a model of public key encryption
(from wikimedia.org)
2. With a partner, discuss how these pictures are different.
Would you trust this method to work to send your own
credit card number?
Take it further: (extension activity)
Read "The Key Agreement Protocol" and "Public Keys for Private
Messages" (Blown to Bits pages 181-183) for more details on Public
Key Encryption.
HOMEWORK:
read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful,
especially to get a better understanding of the
evolution of encryption methods and some details of
public key encryption.
Learning Objectives:
1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to
address these issues with the Internet
and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print
sources for appropriateness and
credibility [P5]
GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
Enduring Understandings:
1. EU 6.3 Cybersecurity is an important
concern for the Internet and the systems
built on it.
2. EU 7.5 An investigative process is aided by
effective organization and selection of
resources. Appropriate technologies and
tools facilitate the accessing of information
and enable the ability to evaluate the
credibility of sources
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and
suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses,
mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may
be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a
computational artifact may be related to how it is used or
perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing
personal information can be challenging.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-
offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in
storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with
data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people
understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often
described by how a user interacts with it
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 11.EK 6.1.1A The Internet connects devices and
networks all over the world.
• 12.EK 6.1.1D The Internet and the systems built on it
facilitate collaboration.
• 13.EK 6.3.1A The trust model of the Internet involves
trade-offs.
• 14. EK 6.3.1B The DNS was not designed to be
completely secure.
• 15. EK 6.3.1C Implementing cybersecurity has
software, hardware, and human components.
• 16. EK 6.3.1D Cyber warfare and cyber crime have
widespread and potentially devastating effects
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many
models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical
foundation.
• 19. EK 6.3.1J Open standards help ensure
cryptography is secure.
• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and
decryption.
• 21. EK 6.3.1L Public key encryption, which is not
symmetric, is an encryption method that is widely
used because of the functionality it provides.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 22.EK 6.3.1M Certificate authorities (CAs) issue
digital certificates that validate the ownership of
encrypted keys used in secured communications and
are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise
legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in
the development and use of computational systems
and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation
of information may be exploited if privacy and other
protections are ignored.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”

More Related Content

What's hot

Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
NEHA PATEL
 
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders LeagueThreat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
Avkash Kathiriya
 
Hacking
Hacking Hacking
Hacking
SahilGothoskar
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
San Diego Continuing Education
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
Inder NeGi
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
Abhinav Biswas
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachability
APNIC
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
Imperva
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
casheeew
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
Emil Tan
 
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
idsecconf
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
KirtiGoyal25
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
Sina Manavi
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
Sithira Pathirana
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
Andrea Bissoli
 

What's hot (20)

Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Threat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders LeagueThreat Deception - Counter Techniques from the Defenders League
Threat Deception - Counter Techniques from the Defenders League
 
Hacking
Hacking Hacking
Hacking
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachability
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
Atmosphere: Secure Messaging for interception protection - Girindro Pringgo D...
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 

Viewers also liked

Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
rajakhurram
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Roman Oliynykov
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Hash function
Hash functionHash function
Hash function
Harry Potter
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
Pawandeep Kaur
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 

Viewers also liked (14)

Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Hash function
Hash functionHash function
Hash function
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 

Similar to Lesson2.9 n u2l6 public keys

Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decoding
Lexume1
 
Lesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keysLesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keys
Lexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
Lexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
Lexume1
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
Lexume1
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
Lexume1
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
rosu555
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
CSCJournals
 
Summers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker TalkSummers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker Talk
Prasad Calyam
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 
Hacking
HackingHacking
Hacking
syahila
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
Gregory Hanis
 

Similar to Lesson2.9 n u2l6 public keys (20)

Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decoding
 
Lesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keysLesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keys
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
Summers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker TalkSummers@Mizzou 2017 Hacker Tracker Talk
Summers@Mizzou 2017 Hacker Tracker Talk
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Hacking
HackingHacking
Hacking
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 

More from Lexume1

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2
Lexume1
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1
Lexume1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impact
Lexume1
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocode
Lexume1
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internet
Lexume1
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programming
Lexume1
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithms
Lexume1
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and information
Lexume1
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstraction
Lexume1
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hex
Lexume1
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representation
Lexume1
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
Lexume1
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representation
Lexume1
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
Lexume1
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
Lexume1
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lexume1
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
Lexume1
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 html
Lexume1
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchy
Lexume1
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancy
Lexume1
 

More from Lexume1 (20)

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impact
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocode
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internet
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programming
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithms
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and information
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstraction
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hex
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representation
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representation
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 html
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchy
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancy
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 

Lesson2.9 n u2l6 public keys

  • 1. L.O: STUDENTS WILL BE ABLE TO EXPLAIN PUBLIC KEY ENCRYPTION. 40-45 minutes DO NOW: READ Unit 2 Lab 6: Encryption, Page 3
  • 2. Public Key Encryption: • the methods discussed so far all have a basic weakness: the encryption method or key needs to be kept secret. But keeping the key private is almost as hard as keeping the message private. In 1976 Ron Rivest, Adi Shamir, and Len Adleman devised an ingenious method (now known as RSA) that allows a person to announce publicly how anyone can encode a message to him so that only he is able to decipher it. The information, which is given away to everybody, is called the public key. The information which is needed for deciphering (the private key) is known only by the person for whom the message is intended. If Bob wants to send Alice a secret message, he enciphers it with Alice's public key. Then no one else can decipher it, even knowing her public key. Only her private key can undo the encryption, and you can't figure out the private key from the public key.
  • 3. For You To Do 1. It may seem incredible that Alice can make her encryption key public and still no one except her can decrypt her message. The RSA method relies on some mathematics and on some limitations on the speed of current computers. Read "Secrecy Changes Forever" (Blown to Bits pages 178-181) to understand some of how this works
  • 4. Here is a model of public key encryption (from wikimedia.org) 2. With a partner, discuss how these pictures are different. Would you trust this method to work to send your own credit card number? Take it further: (extension activity) Read "The Key Agreement Protocol" and "Public Keys for Private Messages" (Blown to Bits pages 181-183) for more details on Public Key Encryption.
  • 5. HOMEWORK: read Chapter 5 of “Blown to Bits”. Reading through the entire chapter will be helpful, especially to get a better understanding of the evolution of encryption methods and some details of public key encryption.
  • 6. Learning Objectives: 1. LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. [P1] 2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5] GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
  • 7. Enduring Understandings: 1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it. 2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 8. Essential Knowledge: 1. EK 1.2.5A The context in which an artifact is used determines the correctness, usability, functionality, and suitability of the artifact. 2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact. 3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived. 4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived. 5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 9. Essential Knowledge: • 6.EK 3.3.1A Digital data representations involve trade- offs related to storage, security, and privacy concerns. • 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information. • 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information. • 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it. • 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 10. Essential Knowledge: • 11.EK 6.1.1A The Internet connects devices and networks all over the world. • 12.EK 6.1.1D The Internet and the systems built on it facilitate collaboration. • 13.EK 6.3.1A The trust model of the Internet involves trade-offs. • 14. EK 6.3.1B The DNS was not designed to be completely secure. • 15. EK 6.3.1C Implementing cybersecurity has software, hardware, and human components. • 16. EK 6.3.1D Cyber warfare and cyber crime have widespread and potentially devastating effects EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 11. Essential Knowledge: • 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity. • 18. EK 6.3.1I Cryptography has a mathematical foundation. • 19. EK 6.3.1J Open standards help ensure cryptography is secure. • 20. EK 6.3.1K Symmetric encryption is a method of encryption involving one key for encryption and decryption. • 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 12. Essential Knowledge: • 22.EK 6.3.1M Certificate authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model. • 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns. • 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts. • 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored. EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Editor's Notes

  1. Page 3: Public Keys. Students will read "Secrecy Changes Forever" from Blown to Bits to learn why public key encryption was such a novel and useful innovation. Again, students should focus on the keys to make sense of the process. The reading and diagram provide the big picture idea. For students who are curious, the Take It Further reading contains more details.
  2. Page 3: Public Keys. Understand what public key encryption is and how it differs from private key encryption. (It is not necessary for students to understand the mathematics involved.