Outline for March 1, 2006

Reading: text, §10.4.2, 10.6, 11.1, 11.3

  1. Greetings and felicitations!
    1. Puzzle of the day
  2. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
  3. Digital Signatures
    1. udge can confirm, to the limits of technology, that claimed signer did sign message
    2. RSA digital signatures: sign, then encipher
  4. Types of attacks
    1. Forward searches
    2. Misordered blocks
    3. Statistical regularities (repetitions)
  5. Networks and ciphers
    1. Where to put the encryption
    2. Link vs. end-to-end

Version of February 28, 2006 at 10:55 PM

You can also obtain a PDF version of this.