CS283 - Class 5 Recap - 20091006

CS283 - Class 5 Recap - 20091006 - Class 5 (20090929)...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 172/283 Autumn 2009 GWU Class 5 (20090929) Recap, Additional Concepts, Q&A, and Additional Reading
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 - Rev 20091006 2 Class 5 (20090929) Recap Q&A - Homework 1 (Discuss multi-factor authentication alternatives) Review of Key Concepts Review of Additional concepts Additional Reading Continue Lecture at Lecture 3 part 2 Slide 8 Review Results of Quiz #2 (last 15 minutes )
Background image of page 2
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 - Rev 20091006 3 Class 5 (20090929) Recap Review of Key Concepts Cryptographic Hash One way function N bits->M bits where M << N Keyed and Keyless Hash algorithm secure against Second Image and Collision Digital Signature authenticates both the origin and the contents of a message in a manner that is provable to a disinterested third party Cryptographic Key Types Session Keys vs Interchange Keys Mechanisms for Key Exchange
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 12/05/2009.

Page1 / 9

CS283 - Class 5 Recap - 20091006 - Class 5 (20090929)...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online