Outline for May 15, 2003
- Cryptographic techniques
- Example: Privacy-Enhanced Electronic Mail (PEM)
- Authentication protocols?
- classical: need trusted third party for both secrecy, authentication
- public key: need to verify to whom public key belongs
- Challenge-response
- UNIX passwords
- S/Key
- Public key
- Standard: encipher with private key, decipher with public key
- Binding public keys to identity: certificates
- X.509, PGP web of trust
- PEM hierarchy of certification
- Representation of identity
- Users, groups, and roles
This document is available in
Postscript and
PDF.