asymmetric_cryptography
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
asymmetric_cryptography [2007/11/29 19:45] – roumani | asymmetric_cryptography [2008/08/29 18:56] (current) – roumani | ||
---|---|---|---|
Line 2: | Line 2: | ||
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | ||
+ | |||
===== Outline ===== | ===== Outline ===== | ||
Line 10: | Line 11: | ||
* The Signing Authority | * The Signing Authority | ||
* Secure Protocols | * Secure Protocols | ||
- | * JSSE | + | * JSSE (out-of-scope for the labtest) |
===== To Do ===== | ===== To Do ===== | ||
- | * Examine the asymmetric programs in '' | + | * Examine the asymmetric programs in '' |
===== Slides from Lecture ===== | ===== Slides from Lecture ===== | ||
- | {{flash>/ | + | {{:44cryptoa.swf?523x416|}} |
asymmetric_cryptography.1196365547.txt.gz · Last modified: 2007/11/29 19:45 by roumani