3.10.attacks - Leftovers: Public-Key Infrastructure...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Leftovers: Public-Key Infrastructure 3/10/2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Certificate Chains Certificate: {David Wagner’s public key is K Dave } K -1 Arnold Certificate chain: {UC Berkeley’s public key is K UCB } K -1 Arnold {David Wagner’s public key is K Dave } K -1 UCB
Background image of page 2
Hierarchical CAs Arnold Cal State U.C. U.C. Irvine U.C. Berkeley UCB EECS David Wagner UCB Math
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Web of Trust David Wagner Vern Christos Bill Cheswick Neil Stephenson Charles Stross
Background image of page 4
SSH SSH client SSH server hi K S {M} K S SSH client SSH server {M} K S First time: All subsequent logins:
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Needham-Schroeder Alice Bob { I’m Alice; use k } K B {M} k Trusted Server { I want to talk to Bob } K A { Use k, and send this to Bob: { I’m Alice; use k } K B } K A
Background image of page 6
Alice Bob { I’m Alice; use k } K B {M} k Trusted Server { I want to talk to Bob } K A { Use k, and send this to Bob: { I’m Alice; use k } K B } K A Bob Bad Guy { I’m Alice; use k } K B {M} k
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Attacks on Cryptography 3/10/2010
Background image of page 8
The Security Problem Wireless networking is just radio communications Hence anyone with a radio can eavesdrop, inject traffic
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Toys for Hackers
Background image of page 10
The Security Risk: RF Leakage
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Risk of Attack From Afar
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/14/2010 for the course CS 161 taught by Professor Wagner during the Spring '10 term at University of Central Arkansas.

Page1 / 21

3.10.attacks - Leftovers: Public-Key Infrastructure...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online