Ready to Start Your Career?

Tutorial: Math For Computer Science Security

xorinsomnia s profile image
By: xorinsomnia
February 9, 2017
Hello, Cybrarians!Today we will continue our discussion about Security, as mentioned in Introduction to Computer Science Security, math is the core of security, and as I promised I will try to make this part as simple as possible. Before we start our discussion, I'd like to mention that during this tutorial, you will figure out that there are two categories of required math and they depend on the branches of Cryptographic studies:
  1. Classic Cryptography require some basic mathematics operation (addition, subtraction, etc..) as we will see in Caesar Cipher,
  2. On the other-hand, Modern Cryptography requires an advanced level of mathematics (function, log, factorization, etc...) as we will see on (RSA algorithm, HASH, etc..)
The Math Tutorial will divide mainly into two parts. For each part, I will add the corresponding references -
  • Basic Math
  • Advanced Math
Basic Math:Basic math corresponding to classic cryptography, hence for the sake of simplicity, I will mention the name of mechanism and a brief of it, till the cryptography part done.Caesar Cipher:In the Caesar cipher (based on simple addition or subtraction a.k.a substitution), the English alphabet consists of 26 letters A = 1, B= 2, C = 3, etc... . In order to apply the Caesar cipher mechanism, you need to shift every letter by 3 positions in the alphabet.
  • For encryption, you need to shift the letter 3 positions to the left (Addition)
    1. Ex.1 suppose we have word (cybrary) to encrypt it we recall caesar cipher
      Adding 3 to every letter will give us the cipher text
      so (cybrary) will be (fbeudub)
  • For decryption, you just need to reverse the previous operation by shifting the letter 3 positions to the right(subtraction)
    1. Ex.1 suppose we have word (VHFXULWB) we want to decrypt it we recall caesar cipher
      Subtracting 3 from every letter will give us the plain text
      so (VHFXULWB) will be (SECURITY)
For the sake of simplicity, we will stop here. I hope you enjoyed this post. The next lesson is substitution cipher which is similar to cipher text.Thank you
Schedule Demo
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry