User Tools

Site Tools


asymmetric_cryptography

This is an old revision of the document!


Asymmetric Cryptography

This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.

Outline

  • The Basic Security Services
  • Brute-Force versus Cryptanalysis
  • Classical Ciphers and their attacks
  • Substitution and Transposition
  • Modern Symmetric Ciphers
  • The Java API

To Do

  • Examine the asymmetric programs in jce and the content of the jsse in the Resource Directory.

Slides from Lecture

/course/4413/_media/:44cryptoA.swf [523,416]

asymmetric_cryptography.1196365401.txt.gz · Last modified: 2007/11/29 19:43 by roumani

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki