Security and Cryptography (S2, 2015)

Key Management and Distribution

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes. You can also download a printable PDF of the notes from last year.

Number of Keys for Link and End-to-end Encryption Decentralised Symmetric Key Distribution Attack on KDC 1 Attack on KDC 2 Attack on KDC 3 Centralised vs Decentralised Key Distribution Man-in-the-middle Attack Public Key Authority Certificate Authority Certificate Examples Certificate Hierarchy

Return to: Course Home | Course List | Steven Gordon's Home | SIIT