Skip to main content

CS409: Cryptography

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS409: Cryptography /
  • Unit 7: Digital Signature and Entity Authentication
Back to course 'CS409: Cryptography'
  • Unit 7: Digital Signature and Entity Authentication

    This unit begins with a general discussion of key exchange methods, or methods designed to distribute keys securely so that they can be later used in a cryptographic algorithm. This unit also describes the difficult problem of computing the discrete logarithm, which is of greatly interest to cryptologists by virtue of its ElGamal signature scheme.

    The unit will then cover five additional schemes (trusted certificates, private certificates, a modified Schnorr algorithm, a modified Guillou-Quisquater algorithm, and a modified Mu-Varadharajan algorithm) before ending with an overview and discussion of public key infrastructure and a lecture by James Massey.

    Completing this unit should take you approximately 12 hours.

    • Unit 7 Learning Outcomes Page
    • 7.1: Key Exchange

      •  Wikipedia: "Key Exchange" URL

        Read this article to learn how to exchange cryptographic keys between users so a cryptographic algorithm can be used.

    • 7.2: Discrete Logarithm

      •  Christoph Bergemann's "Discrete Logarithm" URL

        Read about the discrete logarithm problem, which is of great interest in the field of cryptography.

    • 7.3: The ElGamal Signature Schemes

      •  Wikipedia: "ElGamal Signature Schemes" URL

        Read this article to learn about the system parameters, key and signature generation, verification, correctness, and security of the ElGamal signature scheme.

    • 7.4: Autokey Identity Schemes

      •  University of Delaware: David Mills' "Autokey Identity Schemes" URL

        Read this page to learn about autokey identity schemes.

      •  Wikipedia: "Public Key Infrastructure" URL

        Read this article for general overview of public key infrastructure.

    • 7.5: Cryptography - Science or Magic?

      •  Massachusetts Institute of Technology: James Massey's "Cryptography - Science or Magic?" URL

        Watch this lecture about cryptography. Professor Massey presents a number of topics, including No-break Cryptography, No-leak Secret Sharing, No-key Cryptography, and No-watch Coin Tossing,

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy