CS 231: Computer Security

Basic cryptography questions

Nothing to hand in

Use internet resources (possibly including Chapter 5 of Anderson's Security Engineering, 2e) to make sure you can answer the following questions.

As we dive into SSH and TLS over the next week or so, we'll be constantly thinking about threats and their mitigation. The cryptographic concepts in the questions above will be relevant to the discussion of these threats.