An Introduction to Cryptography
Computer security relies on a number of
complementary technologies. Cryptography is one of them. Unlike
what is sometimes believed, cryptography's role is not only to
ensure the confidentiality of exchanges. It also serves to protect
the integrity of transmitted information, and more importantly in
Grid environments to authenticate individuals and systems. The
lecture describes the fundamentals of asymmetric encryption, and
explain how it is implemented in the real world.
An Introduction to PKI
Cryptography is not sufficient to ensure that
secret information is safely shared. In particular, distributing
cryptographic keys requires an infrastructure of logically connected
systems. This is called Pubic Key Infrastructure and is the subject
of this lecture.
An Introduction to Kerberos
Kerberos is an alternative to PKI fro
authentication. This third lecture explains the respective
positioning and the differences. It also explains how the two
technologies can be integrated. This is illustrated by practical
examples drawn from web and mail services.