Chapter 8 Security

Objectives

To show the need for security policies and mechanisms, particularly in networked systems.
To explain private and public key cryptography.
To explain how cryptography can be used for secure communication, authentication and signatures (non-repudiation).

Points to emphasise

Possible difficulties

Teaching hints

The algorithms/protocols are quite complex. It is worth paying attention to presentation. Dynamic build-up of slides and use of colour, to highlight senders, receivers, third parties etc. may be useful.

Put up e.g. Needham-Schroeder or Kerberos 1 and ask for possible attacks to discuss later.

Emphasise the increasing use of SSL for web-based applications and ssh for connection to inside firewalls.