Outline for May 13, 2003

  1. Cryptographic checksums
    1. Requirements
    2. Keyed vs. keyless cryptographic checksums
    3. HMAC
  2. Digital signatures
    1. Classical cryptography
    2. Public key cryptography
  3. Key Exchange
    1. Kerberos
    2. Diffie-Hellman and Sun's Secure RPC
  4. Cryptographic techniques
    1. End to end cryptography
    2. Link cryptography
    3. Example: Privacy-Enhanced Electronic Mail (PEM)
This document is available in Postscript and PDF.