periphery of each, and between the black lines, put all the letters of the alphabet, not in their established order, but jumbled, & without order, so that no two shall be alike.”
Ciphertext Plaintext Bob’s Public Key Bob’s Private Key Alice Bob Insecure Channel Asymmetric Crypto: Alice obtains Bob’s Public Key, and can send private messages to Bob.
Private Key Alice Bob Insecure Channel Signatures: Bob’s signs a message with his Private Key; Alice verifies signature with Bob’s Public Key. Asymmetric (Public Key) Encryption: Confidentiality Signatures
) Generate random () Decrypt using Secure channel using Super-‐Simplified TLS Protocol Generates key pair: , Verify Certificate using How does the server get its certificate?
) Generate random () Decrypt using Secure channel using Super-‐Simplified TLS Protocol Generates key pair: , Verify Certificate using How does the client (browser) get ?
(“mightbeevil.org”has public key is ), Cipher: RSA-‐1024 Generate random () Decrypt using Secure channel using Slightly Less-‐Simplified TLS Protocol Generates key pair: , Verify Certificate using Picks ciphers to use
public key is ), Cipher: DH-‐E Generate random () Decrypt using Secure channel using Slightly Less-‐Simplified TLS Protocol Generates key pair: , Verify Certificate using Picks ciphers to use
• One week before: full plan for class, selected preparation materials – Post for class in Slack • Class: lead an interesting, engaging, worthwhile class – Not just presenting papers (although that should usually be part of it) – We have 2.5 hours – need to plan accordingly! • Post-‐class: help blogging team 38
topic – Incorporate materials provided by Lead team – Organize into useful and effective web presentation • Draft due by following Tuesday • Final version ready by next Friday 39
have people willing to lead and delegate – Can rotate throughout semester – Roles for each week • Create (public) Slack channel – If you want a team-‐private channel can do that also • Bid for T (lead Class 2: oracle padding attacks) L (blog Class 1/lead 3: Drown) S (lead Class 4: certificates) 41
– Contributes useful to TLS ecosystem – Possibilities: research project, contributing to open source software, deployment studies, alternatives to TLS, measurement study, etc. 43