Download presentation
Presentation is loading. Please wait.
1
CS580 Internet Security Protocols
7/21/2018 CS580 Internet Security Protocols Final Review Huiping Guo Department of Computer Science California State University, Los Angeles
2
Final exam Wed, 06/08, 6:00pm --- 8:30pm Closed book and closed notes
7/21/2018 Final exam Wed, 06/08, 6:00pm --- 8:30pm FA 219 Closed book and closed notes Allowed One page of cheat sheet (letter size, back and front) Write your name on it Calculators Laptops (only the calculator is allowed) You need to bring your own laptop Not allowed Note books Cellphones Final review CS580_S16
3
Topics to be covered Public key infrastructure
Security Sharing Schemes Blind signature Advanced digital signature Other protocols Access Control Final review CS580_S16
4
PKI X.509 Certificates Trust model
How a user verifies a certificate issued by other Cas? Final review CS580_S16
5
Security Sharing Schemes
Simple secret sharing Threshold secret sharing Generalized secret sharing scheme Access structure Complement of AS Verifiable secret sharing For each scheme How it works Why it works Final review CS580_S16
6
Blind signature RSA based blind signature
RSA based partially blind signature Digital cash Protocol #1 Protocol #2 Protocol #3 Protocol #4 For each algorithm/protocol How it works Why it works How to improve it (for digital cash)? Final review CS580_S16
7
Advanced digital signature
Undeniable digital signature Convertible undeniable digital signature Proxy signature Group signatures For each algorithm How it works Why it works Final review CS580_S16
8
Other protocols Bit commitment Secure multiparty communication
Anonymous message broadcast Final review CS580_S16
9
Access control Security policy DAC MAC Access control matrix
Access control lists Capability lists MAC Multilevel security BLP model Biba’s model Multilateral security Chinese wall Final review CS580_S16
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.