Cryptography transforms security problem into key management problems. That is to say, to use encryption, digital signatures, or message authentication codes(MAC), the parties involved have to hold the 'right' cryptographic keys. The following 2 weeks will cover
• major key establishment protocols
• how public keys can be linked to user identities
• how cryptographp protocols are being applied in computer security.
• Possible Topics for assignment 3:
1) Comparing OpenSSL with GunPGP
2) Kerberos and its use in Windows
3) Digital Signature Standard and DSA Algorithm
4) X.509 vs. PKIX
5). How XACML is used in Web Access Control?