Outline for February 25/March 1, 2002

Reading: §10.2, §10.4.2-10.4.3, §10.5.1-10.5.1.1, §10.5.2, §10.6 except §10.6.2.2

  1. Greetings and Felicitations
  2. Puzzle of the day
  3. Key Exchange
    1. Needham-Schroeder and Kerberos
    2. Public key; man-in-the-middle attacks
  4. Cryptographic Key Infrastructure
    1. Certificates (X.509, PGP)
    2. Certificate, key revocation
    3. Key Escrow
  5. Digital Signatures

ECS 153, Introduction to Computer Security
Winter Quarter 2002
Email: [email protected]