v      Subject matter

Ø      Digital signatures and authentication protocols (not including DSS)

§         Digital signatures

·        Requirements for a digital signature

·        Direct and arbitrated signatures

§         Authentication protocols (understand the basis, if not details for each of the protocols in sec 10.2)

Ø      Authentication applications

§         Kerberos (Work through and understand a couple of dialogues)

§         X.509 Directory authentication service (Work through the certificate material)

Ø      Electronic mail security

§         PGP (read this in detail)

§         S/MIME (overview – to depth covered in class)

Ø      IP security (Emphasize architecture and reasoning, not format details)

§         IP Security overview and architecture

§         Header and ESP payload

§         Security associations and key management

v     Coverage

Ø      Through Thursday, March 14

Ø      Chapters 10 through 13 – not including appendices 10A and 12B

v     Preparation

Ø      Read chapters 10 through 13

Ø      Suggested problems

§         10.2, 10.6, 10.9

§         11.1, 11.2, 11.3

§         12.1, 12.2, 12.3. 12.6 (a lot of problems, but these are short and interrelated)

§         13.2, 13.4

v     Exam methodology

Ø      See exam policies

Ø      Open book and notes (avoids memorization)

Ø      Mostly short-answer

§         What if

§         Why

§         Invent a way to do---

§         Protocol analysis and diagnosis

Ø      Learn capabilities, not forgettable details

Ø      Emphasis is more on protocols and algorithm consequences than on ciphers themselves