v Subject matter
Ø Digital signatures and authentication protocols (not including DSS)
§ Digital signatures
· Requirements for a digital signature
· Direct and arbitrated signatures
§ Authentication protocols (understand the basis, if not details for each of the protocols in sec 10.2)
Ø Authentication applications
§ Kerberos (Work through and understand a couple of dialogues)
§ X.509 Directory authentication service (Work through the certificate material)
Ø Electronic mail security
§ PGP (read this in detail)
§ S/MIME (overview – to depth covered in class)
Ø IP security (Emphasize architecture and reasoning, not format details)
§ IP Security overview and architecture
§ Header and ESP payload
§ Security associations and key management
v Coverage
Ø Through Thursday, March 14
Ø Chapters 10 through 13 – not including appendices 10A and 12B
v Preparation
Ø Read chapters 10 through 13
Ø Suggested problems
§ 10.2, 10.6, 10.9
§ 11.1, 11.2, 11.3
§ 12.1, 12.2, 12.3. 12.6 (a lot of problems, but these are short and interrelated)
§ 13.2, 13.4
v Exam methodology
Ø See exam policies
Ø Open book and notes (avoids memorization)
Ø Mostly short-answer
§ What if
§ Why
§ Invent a way to do---
§ Protocol analysis and diagnosis
Ø Learn capabilities, not forgettable details
Ø Emphasis is more on protocols and algorithm consequences than on ciphers themselves