English subtitles

← 03-35 Summary

Get Embed Code
1 Language

Showing Revision 1 created 05/04/2012 by Amara Bot.

  1. This brings us to the end of unit 3.
  2. As long as we have a channel with integrity, we have a solution to our key distribution problem.
  3. We can use the Diffie-Hellman protocol where at the end of the protocol
  4. we've established a shared secret.
  5. Once we're established that shared key we can use it to send messages,
  6. using our symmetric encryption operations from the previous two units.
  7. We still haven't solved many of the important problems that Diffie and Hellman identified
  8. in this 1976 paper.
  9. The one that I highlighted at the beginning was digital signatures.
  10. We can't do digital signatures this way because the key is shared between Alice and Bob.
  11. That couldn't be used to sign something since either Alice or Bob
  12. would be able to make that signature.
  13. To have digital signatures, what we need is asymmetric crypotography.
  14. That's the main topic for Unit 4. Hope to see you there.