Lecture 20: May 12, 2021

Reading: text, §11.2–11.4
Due: None yet; stay tuned


  1. Key Exchange
    1. Public key; man-in-the-middle attacks
    2. The discrete log problem and Diffie-Hellman

  2. Key Generation
    1. Cryptographically random numbers
    2. Cryptographically pseudorandom numbers
    3. Strong mixing function

  3. Cryptographic Key Infrastructure
    1. Certificates
    2. Merkle trees
    3. Certificate chains
    4. Certificate, key revocation


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 135, Computer Security
Version of May 14, 2021 at 9:07AM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh