BSc Coding Techniques / Cryptography
2010. november 16-i előadás:
protocols-codingtech.pdf
Slides:
The history of Cryptography
Symmetric-key encryption
Asymmetric key encryption
Hash functions, MAC functions, and digital signature schemes
Session key establishment protocols
The Secure Socket Layer (SSL) and the Transport Layer Security (TLS) protocols
GSM and 3GPP security
WiFi security (WEP, WPA, WPA2)
Further readings:
Handbook of Applied Cryptography
Chapter 1 and Appendix A of
Security and Cooperation in Wireless Networks