Outline for May 13, 2004

  1. Interchange, Session Keys
  2. Classical Key Exchange
    1. Needham-Schroeder
    2. Kerberos
  3. Public Key Exchange
  4. Key Generation
    1. Random vs. pseudorandom
    2. Mixing
  5. Key Infrastructures
    1. Certificates
    2. Merkle's Tree Authentication scheme
    3. X.509 certificates
    4. PGP certificates
  6. Key Escrow
    1. Goals
    2. EES and Clipper


Here is a PDF version of this document.