asymmetric_cryptography
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
asymmetric_cryptography [2007/11/29 19:43] – created roumani | asymmetric_cryptography [2008/08/29 18:56] (current) – roumani | ||
---|---|---|---|
Line 2: | Line 2: | ||
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | ||
+ | |||
===== Outline ===== | ===== Outline ===== | ||
- | * The Basic Security Services | + | * The Diffie-Hellman-ElGamal Algorithm |
- | * Brute-Force versus Cryptanalysis | + | * The RSA Algorithm |
- | * Classical Ciphers and their attacks | + | * Secure hash Functions |
- | * Substitution and Transposition | + | * The Signing Authority |
- | * Modern Symmetric Ciphers | + | * Secure Protocols |
- | * The Java API | + | * JSSE (out-of-scope for the labtest) |
===== To Do ===== | ===== To Do ===== | ||
- | * Examine the asymmetric programs in '' | + | * Examine the asymmetric programs in '' |
===== Slides from Lecture ===== | ===== Slides from Lecture ===== | ||
- | {{flash>/ | + | {{:44cryptoa.swf?523x416|}} |
asymmetric_cryptography.1196365401.txt.gz · Last modified: 2007/11/29 19:43 by roumani