Lecture 16 Outline
Reading: text, 11.1*–11.2*, 11.4*, 12.1*, 12.3*, 12.4.1*
Assignments: Homework 3, due Nov. 4; Lab 3, due Nov. 4
- Greetings and felicitations!
- Puzzle of the Day
- Key Exchange
- Needham-Schroeder and Kerberos
- Public key; man-in-the-middle attacks
- Key Generation
- Cryptographically random numbers
- Cryptographically pseudorandom numbers
- Strong mixing function
- Cryptographic Key Infrastructure
- Certificates (X.509, PGP)
- Certificate, key revocation
- Digital Signatures
- Judge can confirm, to the limits of technology, that claimed signer did sign message
- RSA digital signatures: sign, then encipher
- Networks and ciphers
- Where to put the encryption
- Link vs. end-to-end
- PEM, PGP
- Goals: confidentiality, authentication, integrity, non-repudiation (maybe)
- Design goals: drop in (not change), works with any RFC 821-conforment MTA and any UA, and exchange messages without prior interaction
- Use of Data Exchange Key, Interchange Key
- Review of how to do confidentiality, authentication, integrity with public key IKs