asymmetric_cryptography
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| asymmetric_cryptography [2007/11/29 19:45] – roumani | asymmetric_cryptography [2008/08/29 18:56] (current) – roumani | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | ||
| + | |||
| ===== Outline ===== | ===== Outline ===== | ||
| Line 10: | Line 11: | ||
| * The Signing Authority | * The Signing Authority | ||
| * Secure Protocols | * Secure Protocols | ||
| - | * JSSE | + | * JSSE (out-of-scope for the labtest) |
| ===== To Do ===== | ===== To Do ===== | ||
| - | * Examine the asymmetric programs in '' | + | * Examine the asymmetric programs in '' |
| ===== Slides from Lecture ===== | ===== Slides from Lecture ===== | ||
| - | {{flash>/ | + | {{:44cryptoa.swf?523x416|}} |
asymmetric_cryptography.1196365547.txt.gz · Last modified: by roumani
