CS283 - Class 5 Recap - 20091006

CS283 - Class 5 Recap - 20091006 - Class 5 (20090929)...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Class 5 (20090929) Recap, Additional Concepts, Q&A, and Additional Reading CS 172/283 Autumn 2009 GWU
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Class 5 (20090929) Recap Q&A - Homework 1 (Discuss multi-factor authentication alternatives) Review of Key Concepts Review of Additional concepts Additional Reading Continue Lecture at Lecture 3 part 2 Slide 8 Review Results of Quiz #2 (last 15 minutes ) GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 - Rev 20091006 2
Background image of page 2
Class 5 (20090929) Recap Review of Key Concepts Cryptographic Hash ¾ One way function ¾ N bits->M bits where M << N ¾ Keyed and Keyless ¾ Hash algorithm secure against Second Image and Collision Digital Signature ¾ authenticates both the origin and the contents of a message in a manner that is provable to a disinterested third party Cryptographic Key Types ¾ Session Keys vs Interchange Keys ¾ Mechanisms for Key Exchange GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 - Rev 20091006 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 9

CS283 - Class 5 Recap - 20091006 - Class 5 (20090929)...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online