Outline for February 5, 2016
Reading: text, §10 in text
Due: Homework 2, due February 5; Project progress report, due February 8
- Key exchange
- Needham-Schroeder and Kerberos
- Public key; man-in-the-middle attacks
- Key Generation
- Cryptographically random numbers
- Cryptographically pseudorandom numbers
- Strong mixing function
- Cryptographic Key Infrastructure
- Certificates (X.509, PGP)