asymmetric_cryptography
This is an old revision of the document!
Table of Contents
Asymmetric Cryptography
This lecture covers the commonly used asymmetric algorithms that are used to secure a channel so it can be used to exchange a symmetric key. It also introduces the digest hash functions, the public key infrastructure, and secure socket connections.
Outline
- The Diffie-Hellman-ElGamal Algorithm
- The RSA Algorithm
- Secure hash Functions
- The Signing Authority
- Secure Protocols
- JSSE (out-of-scope for the labtest)
To Do
- Examine the asymmetric programs in
jce
in the Resource Directory.
Slides from Lecture
/course_archive/2008-09/F/4413/_media/:44cryptoa.swf [523,416]
asymmetric_cryptography.1220035639.txt.gz · Last modified: 2008/08/29 18:47 by jas