asymmetric_cryptography
This is an old revision of the document!
Table of Contents
Asymmetric Cryptography
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
Outline
- The Basic Security Services
- Brute-Force versus Cryptanalysis
- Classical Ciphers and their attacks
- Substitution and Transposition
- Modern Symmetric Ciphers
- The Java API
To Do
- Examine the asymmetric programs in
jce
and the content of thejsse
in the Resource Directory.
Slides from Lecture
/course/4413/_media/:44cryptoA.swf [523,416]
asymmetric_cryptography.1196365401.txt.gz · Last modified: 2007/11/29 19:43 by roumani