asymmetric_cryptography
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
asymmetric_cryptography [2008/04/14 16:22] – roumani | asymmetric_cryptography [2008/08/29 18:56] (current) – roumani | ||
---|---|---|---|
Line 2: | Line 2: | ||
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, | ||
+ | |||
===== Outline ===== | ===== Outline ===== | ||
Line 10: | Line 11: | ||
* The Signing Authority | * The Signing Authority | ||
* Secure Protocols | * Secure Protocols | ||
- | * JSSE | + | * JSSE (out-of-scope for the labtest) |
Line 20: | Line 21: | ||
===== Slides from Lecture ===== | ===== Slides from Lecture ===== | ||
- | {{flash>/ | + | {{:44cryptoa.swf?523x416|}} |
asymmetric_cryptography.1208190139.txt.gz · Last modified: 2008/04/14 16:22 by roumani