Outline for May 13, 2003
- Cryptographic checksums
- Requirements
- Keyed vs. keyless cryptographic checksums
- HMAC
- Digital signatures
- Classical cryptography
- Public key cryptography
- Key Exchange
- Kerberos
- Diffie-Hellman and Sun's Secure RPC
- Cryptographic techniques
- End to end cryptography
- Link cryptography
- Example: Privacy-Enhanced Electronic Mail (PEM)
This document is available in
Postscript
and
PDF.