User Tools

Site Tools


asymmetric_cryptography

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
asymmetric_cryptography [2007/11/29 19:45] roumaniasymmetric_cryptography [2008/08/29 18:56] (current) roumani
Line 2: Line 2:
  
 This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections. This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
 +
  
 ===== Outline ===== ===== Outline =====
Line 10: Line 11:
   * The Signing Authority   * The Signing Authority
   * Secure Protocols   * Secure Protocols
-  * JSSE+  * JSSE (out-of-scope for the labtest) 
  
  
 ===== To Do ===== ===== To Do =====
  
-  * Examine the asymmetric programs in ''jce'' and the content of the ''jsse'' in the //Resource Directory//+  * Examine the asymmetric programs in ''jce'' in the //Resource Directory//
  
 ===== Slides from Lecture ===== ===== Slides from Lecture =====
  
-{{flash>/course/4413/_media/:44cryptoA.swf [523,416]}}+{{:44cryptoa.swf?523x416|}}
asymmetric_cryptography.1196365547.txt.gz · Last modified: 2007/11/29 19:45 by roumani

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki