If you have any trouble accessing any of these materials, please post a note on Piazza and we'll help.
- Slides: all animations, limited animations
- Outline
- Recording
- No supplemental reading for this lecture
- Understand public-key cryptography as a building block for (more) secure systems, in the same way you understand symmetric-key cryptography, hash functions, and MACs.
- Note that using public-key cryptography for encryption is slightly different than using it for signatures.
- Describe how A constructs packets for use in onion routing as described in class (what data does A encrypt, and with what key).
- Given various configurations of proxies, along with various attempts at encryption, decide what sorts of adversaries (if any) would be able to infer that A was communicating with S.
- Explain how to use a single proxy to create a secure connection on a local network, if not all the way from A to S.