C SC 481.20 Lecture 16: Integrity and Authentication
major resource: Computer Networking (4th Edition), Kurose and Ross, Addison Wesley, 2008

[ previous | schedule | next ]

Integrity

Cryptographic Hash Functions

Digital Signatures

Combining the Two

Playback Attacks

How to obtain/verify secret (symmetric) or public key?

Man-In-The-Middle Attacks


Aside: Authentication and confidentiality w/o encrypting data!


[ C SC 481 | Peter Sanderson | Math Sciences server  | Math Sciences home page | Otterbein ]

Last updated:
Peter Sanderson (PSanderson@otterbein.edu)