Outline for May 15, 2003

  1. Cryptographic techniques
    1. Example: Privacy-Enhanced Electronic Mail (PEM)
  2. Authentication protocols?
    1. classical: need trusted third party for both secrecy, authentication
    2. public key: need to verify to whom public key belongs
  3. Challenge-response
    1. UNIX passwords
    2. S/Key
  4. Public key
    1. Standard: encipher with private key, decipher with public key
    2. Binding public keys to identity: certificates
    3. X.509, PGP web of trust
    4. PEM hierarchy of certification
  5. Representation of identity
    1. Users, groups, and roles

This document is available in Postscript and PDF.