User Tools

Site Tools


asymmetric_cryptography

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
asymmetric_cryptography [2008/04/14 16:22] roumaniasymmetric_cryptography [2008/08/29 18:56] (current) roumani
Line 2: Line 2:
  
 This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections. This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
 +
  
 ===== Outline ===== ===== Outline =====
Line 10: Line 11:
   * The Signing Authority   * The Signing Authority
   * Secure Protocols   * Secure Protocols
-  * JSSE+  * JSSE (out-of-scope for the labtest)
  
  
Line 20: Line 21:
 ===== Slides from Lecture ===== ===== Slides from Lecture =====
  
-{{flash>/course/4413/_media/:44cryptoA.swf [523,416]}}+{{:44cryptoa.swf?523x416|}}
asymmetric_cryptography.1208190139.txt.gz · Last modified: 2008/04/14 16:22 by roumani

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki