A basic slideshow complemented with some other slides I used for illustrating my master's thesis at the Illinois Institute of Technology in the field of cryptography and network security.
12. Digital signatures - - Alice Message Hash function Alice’s private key Digital Signature Algorithm – sign operation Digital Signature Digitally signed message (message + digital signature) Hash function Digital signature Digital Signature Algorithm – verify operation Bob Digitally signed message Digital signature verified / signature verification failed Alice’s public key
13.
14.
15.
16.
17.
18.
19.
20.
21. Conclusion WIRELESS SECURITY - - User-managed Technological needs Transparent to the user SSP Ad hoc Certification-authority-dependent DH ECC Digital signature Public Key ? TtS SiB L&C HAPADEP Human-Assisted Resurrecting Duckling policy Entity Recognition IBE Secure Group Communication