Computer and Network Security
CS494/594     Class 9 10/24/06
Topics
public key crypto -- ECC
PKCS
SSH and PGP -- how do they do that?
lecture
slides
Required reading
Text: chapter 10,13,15.1,Appendix 15A-C,4.6
Certicom's interactive
ECC tutorial
how to time-stamp a digital document
Ylonen's
ssh paper
Additional reading
Certicom's
ECC challenge
and their
ECC FAQ
ECC
ECDSA
Integrating Elliptic Curve Cryptography into the Web's Security
RSA speed vs ECC (software)
ECC
implementations
in openssl 0.9.8
Rosing's book
Implementing Elliptic Curve Cryptography
HAC chapter 11
digital signatures
FIPS 186
DSS
legality of digital signatures
EU approves digital signatures
'99
RSA//Surety
digital notary
how ssh works
Ylonen's '95
The SSH (Secure Shell) Remote Login Protocol
v1 protocol
UNIX review's
ssh article
IETF
secure shell group
and the ssh RFC's 4251-4256
a light-weight ssh
dropbear
PGP
data structures
file formats
PGP
attack FAQ
RSA's
PKCS
and PKCS 5
RFC 2898
ANSI
X9 standards
financial service (includes crypto -- 3DES, ECC, ...)
padding
block ciphers
as always, cruise the
security page
Last revised 9/29/04
Back to
lectures
or
class home page