Outline for November 22, 2006
Reading
: §10.6; 11.4.1; 12.1
Greetings and felicitations!
Puzzle of the day
Cryptographic Key Infrastructure
Certificate, key revocation
Digital Signatures
Judge can confirm, to the limits of technology, that claimed signer did sign message
RSA digital signatures: sign, then encipher
PEM, PGP
Goals: confidentiality, authentication, integrity, non-repudiation (maybe)
Design goals: drop in (not change), works with any RFC 821-conformant MTA and any UA, and exchange messages without prior interaction
Use of Data Exchange Key, Interchange Key
Review of how to do confidentiality, authentication, integrity with public key IKs
Details: canonicalization, security services, printable encoding (PEM)
PGP v. PEM
Authentication
validating client (user) identity
validating server (system) identity
validating both (mutual authentication)
You can also obtain a PDF version of this.
Version of November 26, 2006 at 10:00 AM