Outline for April 27, 2000
- Authentication protocols?
- classical: need trusted third party for both secrecy, authentication
- public key: need to verify to whom public key belongs
- Challenge-response
- UNIX passwords
- Kerberos
- S/Key
- Diffie-Hellman and Sun's Secure RPC
- Public key
- Standard: encipher with private key, decipher with public key
- Binding public keys to identity: certificates
- X.509, PGP web of trust
- PEM hierarchy of certification
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 4/29/2000