v      Subject matter

Ø      Digital signatures and authentication protocols (not including DSS)

§         Digital signatures

·        Requirements for a digital signature

·        Direct and arbitrated signatures

§         Authentication protocols (understand the basis, if not details for each of the protocols in sec 10.2)

Ø      Authentication applications

§         Kerberos (Work through and understand a couple of dialogues)

§         X.509 Directory authentication service (Work through the certificate material)

Ø      Electronic mail security

§         PGP (read this in detail)

§         S/MIME (overview – to depth covered in class)

Ø      IP security (Emphasize architecture and reasoning, not format details)

§         IP Security overview and architecture

§         Header and ESP payload

§         Security associations and key management

v     Coverage

Ø      Through Thursday, March 15

Ø      Chapters 11 through 15 – not including appendix 12B

v     Preparation

Ø      Read chapters 11 through 15

Ø      Suggested problems

§         11.1, 11.2, 11.3

§         12.4, 12.10

§         13.1, 13.2, 13.3. 13.6 (a lot of problems, but these are short and interrelated)

§         14.2, 14.4

§         15.5, 15.7, 15.4

v     Exam methodology

Ø      See exam policies

Ø      Open book and notes (avoids memorization)

Ø      Mostly short-answer

§         What if

§         Why

§         Invent a way to do---

§         Protocol analysis and diagnosis

Ø      Learn capabilities, not forgettable details

Ø      Emphasis is more on protocols and algorithm consequences than on ciphers themselves