v Subject matter
v Coverage
Ø Through Tuesday, April 25, 2006
Ø Chapters 14 through 19
v Preparation
Ø Read chapters 14 through 19
Ø Suggested problems
§ 14.3, 14.4
§ 15.4, 15.6
§ 16.2, 16.3
§ 17.2, 17.3
§ 18.6, 18.8
§ 19.2
v Exam methodology
Ø See exam policies
Ø Open book and notes (avoids memorization)
Ø Mostly short-answer
§ What if
§ Why
§ Invent a way to do---
§ Protocol analysis and diagnosis
· Expect a protocol analysis question of at least one exchange in book – for example one of the Oakley variants or an ISAKMP
· SSL emphasis – some on SET techniques
· How do attacks such as SYN flooding and related TCP attacks work
Ø Learn capabilities, not forgettable details
Ø Emphasis is more on protocols and algorithm consequences than on ciphers themselves