Authentication and Identity Management
Summary From the Last Lecture
Key Exchange Diffie -Hellman Symmetric crypto (KDC idea, Needham- Shroeder , Kerberos) Asymmetric crypto – certificates Stolen keys recovery Group keys