E-Learning Course Mathematics in Encryption
Content
E-Learning Mathematics in Encryption (40 min)
- Substitution and Permutation (10 min)
- Function and Inverse Function (10 min)
- XOR (5 min)
- Modulo Calculation (10 min)
- Multiplicative Group of Integers modulo p (5 min)
Target
This e-learning explains important mathematical basics that are required for cryptography. In the following chapters, we explain some of the important concepts that are necessary to understand the encryption and decryption methods: First, the terms substitution and permutation are explained, then the mathematical background of function and inverse function is illustrated and finally you will be introduced to XOR and modulo.
Trailer
Insights
Course Content
What Is Encryption?
Encryption is about transmitting information in such a way that it can only be read by the sender and recipient. If someone in between tries to access the data, they cannot decrypt it.
Several different methods are available for this purpose, which can be divided into symmetric, asymmetric, and hybrid encryption methods. The most common encryption mechanisms include the Advanced Encryption Standard (AES) and RSA.
Why Is Encryption Needed?
Encryption is found in almost all areas of life and is becoming increasingly important. For example, customers want to be sure that their bank data is kept secret when they shop online. In the automotive sector, for example, encryption is central to the secure transmission of updates. Data security – and therefore encryption – also plays an important role in e-mail correspondence and private chats.
Therefore, software developers must have knowledge about IT security during implementation, in particular since encryption is becoming an increasingly omnipresent topic. Thus, an increasing use of encryption methods can be seen. Encryption has also gained in importance due to the Internet: systems are more and more connected. This has enormous advantages but carries also the risk of third parties interfering with communication and thus misusing or manipulating it.
There will definitely be major development steps in the area of encryption in the future. Keywords in this context already important today are digital factory, networked production, autonomous driving and software updates.
How Is Encryption Related to Embedded Systems?
Embedded systems always work through special software, which must be protected in such a way that not everyone can access it and make changes. This means that during the IT security process, encryption must be used to guarantee that the various components cannot be accessed directly.
As embedded systems become more and more networked, there are different levels of encryption. One is normal communication, where data is encrypted. On the other hand, the reprogramming of embedded systems. In the automotive sector, the latter in particular plays an important role, as do error reactions, for example in communication with traffic lights.
What Do You Learn About Encryption in the Embedded Academy E-Learning?
The course on cryptography is divided into two parts.
First, the focus is on classical cryptography, presented in three e-learnings. We begin with a general introduction to the topic, which is followed by a historical overview. Thereby, we will encounter the most famous classical encryption methods: the Scytale, the Caesar Cipher, the Vigenère Cipher, the One-Time Pad and the Enigma.
The second learning unit then moves on from this historical encryption to modern methods, also divided into three e-learnings. Here, using the example of Alice and Bob, A to B encryption from the sender (A) to receiver (B) is explained for the three basic types (symmetric, asymmetric, and hybrid) and further illuminated using concrete methods such as the DES, AES, RSA and the Diffie-Hellman Key Exchange.
With the help of the e-learnings, learners understand the different procedures. They then know how they are applied, which group they belong to, and can evaluate which mechanism make the most sense for which application during implementation.
You must log in and have started this course to submit a review.