====== Asymmetric Cryptography ====== This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections. ===== Outline ===== * The Diffie-Hellman-ElGamal Algorithm * The RSA Algorithm * Secure hash Functions * The Signing Authority * Secure Protocols * JSSE (out-of-scope for the labtest) ===== To Do ===== * Examine the asymmetric programs in ''jce'' in the //Resource Directory//. ===== Slides from Lecture ===== {{:44cryptoa.swf?523x416|}}