EECS 122, Lecture 29

5/6/99


Click here to start


Table of Contents

EECS 122, Lecture 29

Network Security

Protecting Yourself

Common Approaches to Security

Cryptography

Basic Cryptographic Concepts

The Main Issues

The Main Issues

Secret Key Functions

Public Key Functions

Hashes and Message Digests

The Basics of DES

The Basics of DES (cont’d)

The Basics of RSA

The Basics of RSA (cont’d)

Random Numbers

Random Number Generation

In the first half of the semester...

In the first half of the semester...

In the first half of the semester...

In the first half of the semester...

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

And in the second half…

Author: kfall

Email: kfall@cs.berkeley.edu

Home Page: http://www-inst.eecs.berkeley.edu/~ee122