Lecture 18 Outline
Reading: text, 12.1*, 12.3*, 12.4.1*
Assignments: Homework 3, due Nov. 4; Lab 3, due Nov. 4
- Networks and ciphers
- Where to put the encryption
- Link vs. end-to-end
- PEM, PGP
- Quick review
- Goals: confidentiality, authentication, integrity, non-repudiation (maybe)
- Design goals: drop in (not change), works with any RFC 821-conforming MTA and any UA, and
exchange messages without prior interaction
- Use of Data Exchange Key, Interchange Key
- Review of how to do confidentiality, authentication, integrity with public key IKs
- Details: canonicalization, security services, printable encoding (PEM)
- PGP v. PEM