Outline for February 22/25, 2002
Reading:
§9.4, §10.2, §10.4.2-10.4.3, §10.5.1-10.5.1.1, §10.5.2, §10.6 except §10.6.2.2
-
Greetings and Felicitations
-
Puzzle of the day
-
Cryptographic Checksums
-
Function
y
=
h
(
x
): easy to compute
y
given
x
; computationally infeasible to compute
x
given
y
-
Variant: given
x
and
y
, computationally infeasible to find a second
x'
such that
y
=
h
(
x'
).
-
Keyed
vs
. keyless
-
MD5, HMAC
-
Key Exchange
-
Needham-Schroeder and Kerberos
-
Public key; man-in-the-middle attacks
-
Cryptographic Key Infrastructure
-
Certificates (X.509, PGP)
-
Certificate, key revocation
-
Key Escrow
-
Digital Signatures