Slides for Lecture for February 10, 2016
Author: Matt Bishop
Given at: UC Davis
Date: February 10, 2016
First slide (slide 1)
Last slide (slide 63)
PDF version
Slide 1: Lecture for February 10, 2016
Slide 2: Supporting Crypto
Slide 3: RSA: Cipher, MAC Algorithms in SSL
Slide 4: RSA: Cipher, MAC Algorithms\line in TLS
Slide 5: Diffie-Hellman: Types
Slide 6: D-H: Cipher, MAC Algorithms in SSL
Slide 7: D-H: Cipher, MAC Algorithms in TLS
Slide 8: Ephemeral D-H: Cipher, MAC Algorithms in SSL
Slide 9: Ephemeral D-H: Cipher, MAC Algorithms in TLS
Slide 10: Anonymous D-H: Cipher, MAC Algorithms in SSL
Slide 11: Anonymous D-H: Cipher, MAC Algorithms in TLS
Slide 12: Fortezza: Cipher, MAC Algorithms
Slide 13: Digital Signatures
Slide 14: SSL Record Layer
Slide 15: Record Protocol Overview
Slide 16: SSL MAC Computation
Slide 17: TLS MAC Computation
Slide 18: SSL Handshake Protocol
Slide 19: Overview of Rounds
Slide 20: Handshake Round 1
Slide 21: Handshake Round 2
Slide 22: Handshake Round 3
Slide 23: Handshake Round 3, SSL master
Slide 24: Handshake Round 3, TLS master
Slide 25: Handshake Round 3
Slide 26: Handshake Round 4
Slide 27: SSL Change Cipher Spec Protocol
Slide 28: SSL Alert Protocol
Slide 29: SSL Alert Protocol Errors
Slide 30: SSL Application Data Protocol
Slide 31: SSL Issues
Slide 32: Heartbleed
Slide 33: The Attack
Slide 34: What Happens
Slide 35: FREAK
Slide 36: Background
Slide 37: Man-In-The-Middle Attack
Slide 38: Man-In-The-Middle Attack
Slide 39: The Attack
Slide 40: A Helpful Error
Slide 41: POODLE
Slide 42: Assumptions
Slide 43: On Receiving Message \uc1\u8230\'c9
Slide 44: The Attack
Slide 45: How To Do This
Slide 46: Why It Works
Slide 47: Take It From There
Slide 48: Results
Slide 49: Background: Entropy
Slide 50: Random Variable
Slide 51: Joint Probability
Slide 52: Two Dependent Events
Slide 53: Conditional Probability
Slide 54: Relationship
Slide 55: Entropy
Slide 56: Heads or Tails?
Slide 57: n-Sided Fair Die
Slide 58: Ann, Pam, and Paul
Slide 59: Joint Entropy
Slide 60: Example
Slide 61: Conditional Entropy
Slide 62: Example
Slide 63: Perfect Secrecy