v Subject matter
Ø Digital signatures and authentication protocols (not including DSS)
§ Digital signatures
· Requirements for a digital signature
· Direct and arbitrated signatures
§ Authentication protocols (understand the basis, if not details for each of the protocols in sec 10.2)
Ø Authentication applications
§ Kerberos (Work through and understand a couple of dialogues)
§ X.509 Directory authentication service (Work through the certificate material)
Ø Electronic mail security
§ PGP (read this in detail)
§ S/MIME (overview – to depth covered in class)
Ø IP security (Emphasize architecture and reasoning, not format details)
§ IP Security overview and architecture
§ Header and ESP payload
§ Security associations and key management
v Coverage
Ø Through Thursday, March 15
Ø Chapters 11 through 15 – not including appendix 12B
v Preparation
Ø Read chapters 11 through 15
Ø Suggested problems
§ 11.1, 11.2, 11.3
§ 12.4, 12.10
§ 13.1, 13.2, 13.3. 13.6 (a lot of problems, but these are short and interrelated)
§ 14.2, 14.4
§ 15.5, 15.7, 15.4
v Exam methodology
Ø See exam policies
Ø Open book and notes (avoids memorization)
Ø Mostly short-answer
§ What if
§ Why
§ Invent a way to do---
§ Protocol analysis and diagnosis
Ø Learn capabilities, not forgettable details
Ø Emphasis is more on protocols and algorithm consequences than on ciphers themselves