Outline for February 27, 2006

Reading: text, §9.4, 10.1–10.2, 10.4.2, 10.6, 11.1, 11.3

  1. Greetings and felicitations!
    1. Puzzle of the day
  2. Cryptographic Checksums
    1. Function y = h(x): easy to compute y given x; computationally infeasible to compute x given y
    2. Variant: given x and y, computationally infeasible to find a second x′ such that y = h(x′)
    3. Keyed vs. keyless
  3. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. Public key; man-in-the-middle attacks
  4. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
  5. Digital Signatures
    1. udge can confirm, to the limits of technology, that claimed signer did sign message
    2. RSA digital signatures: sign, then encipher
  6. Types of attacks
    1. Forward searches
    2. Misordered blocks
    3. Statistical regularities (repetitions)
  7. Networks and ciphers
    1. Where to put the encryption
    2. Link vs. end-to-end

Version of February 27, 2006 at 1:29 PM
You can also obtain a PDF version of this.