Chapter 8 Security
Objectives
Points to emphasise
Possible difficulties
Teaching hints
The algorithms/protocols are quite complex. It is worth paying attention to presentation. Dynamic build-up of slides and use of colour, to highlight senders, receivers, third parties etc. may be useful.
Put up e.g. Needham-Schroeder or Kerberos 1 and ask for possible attacks to discuss later.
Emphasise the increasing use of SSL for web-based applications and ssh for connection to inside firewalls.