Encrypting the Internet


Click here to start

Table of Contents

Encrypting the Internet


Threat Models I.e, What are you worried about?



Traffic Analysis

Denial of Service

Enforcing Subnetwork Transparency

Cryptography Basics

Properties of a Good Modern Cipher

Types of Cryptography

DES: a typical symmetric block cipher

Brute force keysearching

Deep Crack

Deep Crack

Alternatives to DES

More DES alternatives

Encryption for Authentication

Sample authentication scheme

Challenge-response protocols

Cryptographic hash functions

Generic hash function

Properties of hash functions

Hash functions for confidentiality

Public key cryptography

Why public key?

Public key theory

Discrete logarithm

Diffie-Hellman key exchange

Diffie-Hellman in detail


RSA in detail

RSA decryption

RSA Signatures

Generating a digital signature

Verifying a digital signature

Public Key Management


Other PK algorithms

Crypto - Necessary But Not Sufficient

The Internet Reference Model

The Internet Reference Model

The Major Internet Protocols

The End-to-End Principle

Encryption in the Internet

Encryption in the Subnet

Encryption Above IP

IP Security (IPSEC)

IPSec Packet Format

Authentication Header (AH)

Encapsulating Security Protocol (ESP)

IPSec Key Management

Encryption Above TCP

Encryption Protocols Above TCP

Application-layer Encryption

Encryption Layer Choices

Crypto Politics

Bernstein Case

Karn Case

Junger Case

Current Status of Export Controls

Legal Status

Author: nobody

Email: karn@qualcomm.com

Home Page: http://people.qualcomm.com/karn

Download presentation source