Basic Protocols Schneier Ch. Three. Key Exchange w/ Symmetric Crypto 1.Desire A and B on network, sharing secret key with KDC. How??? 2.A request session.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
1 CS 194: Lecture 28 Review, Part II Location of exam: A1 HEARST ANNEX.
Basic Protocols
CMSC 414 Computer and Network Security Lecture 20