User Tools

Site Tools


asymmetric_cryptography

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
asymmetric_cryptography [2007/11/29 19:43] – created roumaniasymmetric_cryptography [2008/08/29 18:56] (current) roumani
Line 2: Line 2:
  
 This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections. This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
 +
  
 ===== Outline ===== ===== Outline =====
  
-  * The Basic Security Services +  * The Diffie-Hellman-ElGamal Algorithm 
-  * Brute-Force versus Cryptanalysis +  * The RSA Algorithm 
-  * Classical Ciphers and their attacks +  * Secure hash Functions 
-  * Substitution and Transposition +  * The Signing Authority 
-  * Modern Symmetric Ciphers +  * Secure Protocols 
-  * The Java API+  * JSSE (out-of-scope for the labtest) 
  
  
 ===== To Do ===== ===== To Do =====
  
-  * Examine the asymmetric programs in ''jce'' and the content of the ''jsse'' in the //Resource Directory//+  * Examine the asymmetric programs in ''jce'' in the //Resource Directory//
  
 ===== Slides from Lecture ===== ===== Slides from Lecture =====
  
-{{flash>/course/4413/_media/:44cryptoA.swf [523,416]}}+{{:44cryptoa.swf?523x416|}}
asymmetric_cryptography.1196365401.txt.gz · Last modified: 2007/11/29 19:43 by roumani

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki