User Tools

Site Tools


asymmetric_cryptography

This is an old revision of the document!


Asymmetric Cryptography

This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.

Outline

  • The Diffie-Hellman-ElGamal Algorithm
  • The RSA Algorithm
  • Secure hash Functions
  • The Signing Authority
  • Secure Protocols
  • JSSE (out-of-scope for the labtest)

To Do

  • Examine the asymmetric programs in jce in the Resource Directory.

Slides from Lecture

/course_archive/2008-09/F/4413/_media/:44cryptoa.swf [523,416]

The Adobe Flash Plugin is needed to display this content.

asymmetric_cryptography.1220035425.txt.gz · Last modified: 2008/08/29 18:43 by jas