Lecture 14: October 25, 2019

Reading: text, §11.1–11.2, 11.4, 12–12.3, [5]
Due: Lab 2, due November 6, 2019; Homework 3, due November 8, 2019


  1. Greetings and felicitations!
  2. Puzzle of the Day
  3. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. The discrete log problem and Diffie-Hellman
    3. Public key; man-in-the-middle attacks
  4. Key Generation
    1. Cryptographically random numbers
    2. Cryptographically pseudorandom numbers
    3. Strong mixing function
  5. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
  6. Cipher problems
    1. Precomputation
    2. Misordered blocks
    3. Statistical regularities
    4. Type flaw attacks
  7. Networks and ciphers
    1. Where to put the encryption
    2. Link vs. end-to-end

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of October 23, 2019 at 7:16PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh