asymmetric_cryptography
Table of Contents
Asymmetric Cryptography
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
Outline
- The Diffie-Hellman-ElGamal Algorithm
- The RSA Algorithm
- Secure hash Functions
- The Signing Authority
- Secure Protocols
- JSSE (out-of-scope for the labtest)
To Do
- Examine the asymmetric programs in
jce
in the Resource Directory.
Slides from Lecture
asymmetric_cryptography.txt · Last modified: 2008/08/29 18:56 by roumani