asymmetric_cryptography
                Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| asymmetric_cryptography [2007/11/29 19:43] – created roumani | asymmetric_cryptography [2008/08/29 18:56] (current) – roumani | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | ||
| + | |||
| ===== Outline ===== | ===== Outline ===== | ||
| - | * The Basic Security Services | + | * The Diffie-Hellman-ElGamal Algorithm | 
| - | * Brute-Force versus Cryptanalysis | + | * The RSA Algorithm | 
| - | * Classical Ciphers and their attacks | + | * Secure hash Functions | 
| - | * Substitution and Transposition | + | * The Signing Authority | 
| - | * Modern Symmetric Ciphers | + | * Secure Protocols | 
| - | * The Java API | + | * JSSE (out-of-scope for the labtest) | 
| ===== To Do ===== | ===== To Do ===== | ||
| - | * Examine the asymmetric programs in '' | + | * Examine the asymmetric programs in '' | 
| ===== Slides from Lecture ===== | ===== Slides from Lecture ===== | ||
| - | {{flash>/ | + | {{:44cryptoa.swf?523x416|}} | 
asymmetric_cryptography.1196365401.txt.gz · Last modified:  by roumani
                
                