Lecture 14: October 25, 2019
Reading: text, §11.1–11.2, 11.4, 12–12.3, [5]
Due: Lab 2, due November 6, 2019; Homework 3, due November 8, 2019
- Greetings and felicitations!
- Puzzle of the Day
- Key Exchange
- Needham-Schroeder and Kerberos
- The discrete log problem and Diffie-Hellman
- Public key; man-in-the-middle attacks
- Key Generation
- Cryptographically random numbers
- Cryptographically pseudorandom numbers
- Strong mixing function
- Cryptographic Key Infrastructure
- Certificates (X.509, PGP)
- Certificate, key revocation
- Cipher problems
- Precomputation
- Misordered blocks
- Statistical regularities
- Type flaw attacks
- Networks and ciphers
- Where to put the encryption
- Link vs. end-to-end