Outline for December 4, 2014

Reading: text, § 11, 26
Due: Homework #4, due December 10, 2014 at 11:55pm
  1. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. Public key; man-in-the-middle attacks
  2. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
  3. Digital Signatures
    1. Judge can confirm, to the limits of technology, that claimed signer did sign message
    2. RSA digital signatures: sign, then encipher
  4. Network Organization for Security
    1. Firewalls and a DMZ
    2. Network architecture
    3. Availability

You can also obtain a PDF version of this. Version of December 3, 2014 at 9:11PM

ECS 235A, Computer and Information Security
Fall Quarter 2014