Outline for February 5, 2016

Reading: text, §10 in text
Due: Homework 2, due February 5; Project progress report, due February 8

  1. Key exchange
    1. Needham-Schroeder and Kerberos
    2. Public key; man-in-the-middle attacks
  2. Key Generation
    1. Cryptographically random numbers
    2. Cryptographically pseudorandom numbers
    3. Strong mixing function
  3. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)


You can also obtain a PDF version of this. Version of February 9, 2016 at 10:50PM