Lecture 14. Miscellaneous

14.1 Active IETF Working Groups in Security Area

14.2 Miscellaneous Topics

  1. Key Recovery

  2. Digital Watermarking for Digital Copyright Protection

  3. MAC (Message Authentication Code)

  4. ±¹»ê ¾ÏÈ£ ¾Ë°í¸®Áò

  5. VPN (Virtual Private Network) and Tunneling

  6. Active Attacks and Passive Attacks on Network Transmission
     
  7. Availability and Denial of Service Attack
    .
  8. Block Cipher Modes of Operation

  9. Challenge-Response Protocol
     
  10. Fortezza card, Clipper chip for Phone, Capstone chip for e-mail applications

  11. Cryptanalysis classification

  12. Key Recovery

  13. Replay attacks and the use of nonce in security protocols

  14. MIM (man-in-the-middle) attacks

  15. Tempest (Transient ElectroMagnetic PulsE Surveillance Technology)

  16. Phreaking: hardware cracking, phone phreaking

  17. Warez

  18. Covert Channel