Lecture

Security Protocols in Practice

Related lectures (32)
Trust Establishment: Bluetooth Security
Explores trust establishment in Bluetooth security, covering protocols, vulnerabilities, countermeasures, and security features.
Diffie-Hellman and ElGamal Cryptosystems
Explores Diffie-Hellman key exchange, ElGamal cryptosystem, and their security applications in cryptography.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Zerologon Vulnerability in Netlogon Protocol
Explores the Zerologon vulnerability in the Netlogon Protocol, enabling unauthorized authentication and potential domain control.
SSL Certificate Deployment for ENAC Web Hosting
Focuses on SSL certificate deployment for ENAC Web Hosting, covering certificate generation, debugging, and Ansible playbook management.
Introduction to Cryptography: Basic Concepts
Covers the basic concepts of cryptography, including Caesar's and Vigenère's ciphers, privacy, authenticity, and message integrity.
Legacy Web Hosting Services Tour
Covers a tour of legacy web hosting services and discussions on future services storage.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.