Tom Kelliher, CS 325
Feb. 12, 2010
Phil Zimmermann video.
Discussion of individual Perl/CGI assignment and project.
This technique was known to IBM and the NSA much earlier.
Requires two plaintext, ciphertext pairs.
Why a decrypt stage? Consider the case -- single DES.
Meet in the middle attack not effective.
Vetted by NSA.
Key lengths of 192 and 256 are approved for US Top Secret level data.
Decreasing the number of rounds weakens AES. To date, best known attacks are with 7, 8, 9 rounds, respectively. Too close for comfort?
What do we mean by breaking encryption?
General principles:
Also: .
Elements:
Key distribution?
E for privacy, D for authentication.
How can ``someone'' securely send you a document?
How do I convince you of my identity?
How do I securely send you a document, convincing you it's from me?
Requirements for secure information transfer between two parties. Information should be:
Digital certificate:
What is the goal of SSL? How does it work?