Outline for April 30, 1997 1. Greetings and Felicitations 2. Do Needham-Schroeder authentication protocol a. Original authentication protocol b. Denning-Sacco modification c. Kerberos implementation 3. Do X.509 authentication protocol a. Token format and flaw b. One-way handshake c. Two-way handshake d. Three-way handshake and flaw 4. Internet certificate managament protocol