Testando
Dan Boneh
Introduc/on
Course Overview
Dan Boneh
Welcome Course objec/ves: • Learn how crypto primi/ves work • Learn how to use them correctly and reason about security My recommenda/ons: • Take notes • Pause video frequently to think about the material • Answer the in-‐video ques/ons Dan Boneh
Cryptography is everywhere Secure communica,on: – web traffic:
HTTPS – wireless traffic:
802.11i WPA2 (and WEP),
GSM,
Bluetooth
Encryp,ng files on disk:
EFS, TrueCrypt Content protec,on (e.g. DVD, Blu-‐ray):
CSS, AACS
User authen,ca,on …
and much much more Dan Boneh
Secure communica/on
no eavesdropping no tampering
Dan Boneh
Secure Sockets Layer / TLS
Two main parts 1. Handshake Protocol:
Establish shared secret key using public-‐key cryptography
(2nd part of course) 2. Record Layer:
Transmit data using shared secret key Ensure confiden/ality and integrity
(1st part of course) Dan Boneh
Protected files on disk Disk Alice