Lecture notes on Computer and network security: Lecture 13 - Avinash Kak

Lecture 13 - Certificates, digital signatures, and the diffie-hellman key exchange algorithm. The goals of this chapter are: Authenticating users and their public keys with certificates signed by Certificate Authorities (CA), exchanging session keys with public-key cryptography, certificates, Perl and Python code for harvesting RSA moduli from certificates, the Diffie-Hellman algorithm for exchanging session keys. | Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak (kak@) February 29, 2016 6:16pm c 2016 Avinash Kak, Purdue University Goals: • Authenticating users and their public keys with certificates signed by Certificate Authorities (CA) • Exchanging session keys with public-key cryptography • certificates • Perl and Python code for harvesting RSA moduli from certificates • The Diffie-Hellman algorithm for exchanging session keys • The ElGamal digital signature algorithm • Can the certificates issued by CAs be forged? CONTENTS Section Title Page Using Public Keys to Exchange Secret Session Keys 3 A Direct Key Exchange Protocol 5 Certificate Authorities for Authenticating Your Public Key 8 Using Authenticated Public Keys to Exchange a Secret Session Key 14 The Certificate Format Standard for Public-Key Infrastructure (PKI) 16 Harvesting RSA Moduli from Certificates — Perl and Python code 29 The Diffie-Hellman Algorithm for Generating a Shared Secret Session Key 37 The ElGamal Algorithm for Digital Signatures 46 On Solving the Discrete Logarithm Problem 51 Can the Certificates Issued by a CA be Forged? 55 Homework Problems 58 2 Computer and Network Security by Avi Kak Lecture 13 : USING PUBLIC KEYS TO EXCHANGE SECRET SESSION KEYS • From the presentation on RSA cryptography in Lecture 12, you saw that public key cryptography, at least when using the RSA algorithm, is not suitable for the encryption of the actual message content. • However, public key cryptography fulfills an extremely important role in the overall design and operation of secure computer networks because it leads to superior protocols for managing and distributing secret session keys that can subsequently be used for the encryption of actual message content using symmetric-key algorithms .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
30    265    2    05-06-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.