How to navigate through these slides:

 
So navigieren Sie durch diese Folien:

 

Cryptography and Certificates
WWUCA and DFN-PKI

Rainer Perske

ca. 90 min.


Open this file with your browser:
https://www.uni-muenster.de/IT.RainerPerske/2022-01-24.CryptographyAndCertificates.WI.html

Table of contents

  1. Part 1: The problem

  2. Part 2: Cryptographic building blocks

  3. Part 3: Certificates and Certification Authorities

  4. Part 4: WWUCA and DFN-PKI

  5. Part 5: Getting certificates

Part 1: The problem

  1. Communication problems

  2. Cryptography as problem solution

Communication problems

Cryptography as problem solution

Part 2: Cryptographic building blocks

  1. Symmetric cryptography (secret key systems)

  2. Properties of secret key systems

  3. Asymmetric Cryptography (public key systems)

  4. Public key systems: When which key?

  5. How do public key systems help?

  6. Properties of public key systems

  7. Key sizes and security

  8. Cryptographic essences (fingerprints)

  9. Combine systems for speed – sign and verify

  10. Combine systems for speed – encrypt and decrypt

  11. Summary

Symmetric cryptography (secret key systems)

Properties of secret key systems

Personal identification by the WWUCA (2)





Thank you