Lecture 17 Outline

Reading: §11.2.1.1, 11.2.2–11.4
Due: Homework 3, due on May 11, 2018 at 11:59pm; Lab 2, due on May 9, 2018 at 11:59pm


  1. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. The discrete log problem and Diffie-Hellman
    3. Public key; man-in-the-middle attacks
  2. Key Generation
    1. Cryptographically random numbers
    2. Cryptographically pseudorandom numbers
    3. Strong mixing function
  3. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of May 6, 2018 at 10:04PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh