Lecture 20: May 12, 2021
Reading
:
text
, §11.2–11.4
Due
: None yet; stay tuned
Key Exchange
Public key; man-in-the-middle attacks
The discrete log problem and Diffie-Hellman
Key Generation
Cryptographically random numbers
Cryptographically pseudorandom numbers
Strong mixing function
Cryptographic Key Infrastructure
Certificates
Merkle trees
Certificate chains
Certificate, key revocation
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 135, Computer Security
Version of May 14, 2021 at 9:07AM
You can also obtain a PDF version of this.