Outline for October 24, 2003

Reading: Chapters 10.2, 10.4, 10.6

Discussion Problem

Define spam. In particular, what distinguishes spam from unsolicited e-mail?

Outline for the Day

  1. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. Public key; man-in-the-middle attacks
  2. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
  3. Digital Signatures
    1. Judge can confirm, to the limits of technology, that claimed signer did sign message
    2. RSA digital signatures: sign, then encipher

Here is a PDF version of this document.