Lecture 16: May 3, 2021

Reading: text, §8.3–8.4,10.1–10.2.2
Due: Lab 2, due May 5, 2021; Homework 3, due May 10, 2021 (Note new due date)


  1. Originator-controlled access control
    1. Digital rights management

  2. Role-based access control

  3. Cryptography
    1. Codes vs. ciphers
    2. Attacks: ciphertext only, known plaintext, chosen plaintext
    3. Types: substitution, transposition

  4. Symmetric Cryptography
    1. Monoalphabetic (simple substitution): f(a) = a + k mod n
    2. Example: Caesar (shift) cipher with k = 3, RENAISSANCEUHQDLVVDQFH


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 135, Computer Security
Version of May 3, 2021 at 11:17PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh