Author: Matt Bishop Given at: UC Davis Date: February 8, 2016 |
First slide (slide 1) Last slide (slide 43) PDF version |

Slide 1: Lecture for February 8, 2016

Slide 2: Cryptographic Key Infrastructure

Slide 3: Certificates

Slide 4: Use

Slide 5: X.509 Chains

Slide 6: X.509 Certificate Validation

Slide 7: Issuers

Slide 8: Validation and Cross-Certifying

Slide 9: PGP Chains

Slide 10: OpenPGP Signature Packet

Slide 11: Signing

Slide 12: Validating Certificates

Slide 13: Storing Keys

Slide 14: Key Revocation

Slide 15: CRLs

Slide 16: Digital Signature

Slide 17: Common Error

Slide 18: Classical Digital Signatures

Slide 19: Public Key Digital Signatures

Slide 20: RSA Digital Signatures

Slide 21: Attack #1

Slide 22: El Gamal Digital Signature

Slide 23: Example

Slide 24: Attack

Slide 25: Using Ciphers

Slide 26: Problems

Slide 27: Attack #1: Precomputation

Slide 28: Example

Slide 29: May Not Be Obvious

Slide 30: Misordered Blocks

Slide 31: Notes

Slide 32: Statistical Regularities

Slide 33: What These Mean

Slide 34: Networks and Cryptography

Slide 35: Link and End-to-End Protocols

Slide 36: Encryption

Slide 37: Examples

Slide 38: Cryptographic Considerations

Slide 39: Traffic Analysis

Slide 40: SSL

Slide 41: SSL Session

Slide 42: SSL Connection

Slide 43: Structure of SSL

Slide 2: Cryptographic Key Infrastructure

Slide 3: Certificates

Slide 4: Use

Slide 5: X.509 Chains

Slide 6: X.509 Certificate Validation

Slide 7: Issuers

Slide 8: Validation and Cross-Certifying

Slide 9: PGP Chains

Slide 10: OpenPGP Signature Packet

Slide 11: Signing

Slide 12: Validating Certificates

Slide 13: Storing Keys

Slide 14: Key Revocation

Slide 15: CRLs

Slide 16: Digital Signature

Slide 17: Common Error

Slide 18: Classical Digital Signatures

Slide 19: Public Key Digital Signatures

Slide 20: RSA Digital Signatures

Slide 21: Attack #1

Slide 22: El Gamal Digital Signature

Slide 23: Example

Slide 24: Attack

Slide 25: Using Ciphers

Slide 26: Problems

Slide 27: Attack #1: Precomputation

Slide 28: Example

Slide 29: May Not Be Obvious

Slide 30: Misordered Blocks

Slide 31: Notes

Slide 32: Statistical Regularities

Slide 33: What These Mean

Slide 34: Networks and Cryptography

Slide 35: Link and End-to-End Protocols

Slide 36: Encryption

Slide 37: Examples

Slide 38: Cryptographic Considerations

Slide 39: Traffic Analysis

Slide 40: SSL

Slide 41: SSL Session

Slide 42: SSL Connection

Slide 43: Structure of SSL