Based on what I understand about ensuring message integrity and preventing
messages from being repudiated by their original sender, we use asymmetric
encryption, and sign our messages using one of the two keys of our keypair.
Which of the two do we use for the signature? Do we incorporate asymmetric
keys in our homework? Or could I use a symmetric to sign the cryptographic
hash of the message
Diffy-Hellman allows for the exchange of encryption keys to take place
securely through a public channel, can we whiteboard this process together?
It's a little hazy
What is the relationship between cryptographic keys certificate and
signatures? Does one use the certificate to encrypt? It's a little confusing
I'm used to RSA
Is there an AES mode that doesn't require an initialization vector?
Would using the digest of the plaint text file as the initialization vector be
insecure?
While the semester is still in the early stages, I wanted to go over my grade
to see if I needed to reconcile any omitted entries, can you confirm I'm not
missing participation for lectures thus far
We've covered a lot of attacks in this class, what's an example of a question
we might be asked on a midterm related to these attack
Will we be given a list of attacks we should be expected to know
Forward privacy: if my current key is leaked, it will only reveal anything that
happened in the future.
Final exam is multiple choice.