Outline for October 24, 2003
Reading: Chapters 10.2, 10.4, 10.6
Discussion Problem
Define spam. In particular, what distinguishes spam from unsolicited
e-mail?
Outline for the Day
- Key Exchange
- Needham-Schroeder and Kerberos
- Public key; man-in-the-middle attacks
- Cryptographic Key Infrastructure
- Certificates (X.509, PGP)
- Certificate, key revocation
- Digital Signatures
- Judge can confirm, to the limits of technology, that claimed
signer did sign message
- RSA digital signatures: sign, then encipher
Here is a PDF version of this document.