Main Page
Current News -- You are there!
Course Info.
Teaching Assistants
Class lists
Feedback
Lecture Schedule
Projects
Download Utilities
Help Pages
 
60-205

Current News



March 31, 2015

Extra Course Material

In light of recent requests made by students, some supplementary notes used in course lectures have been posted on the website. They can be accessed by clicking on the link below. In the third set of slides please stop at ATM. We didn't cover that.

  1. Part 1 Data Communications
  2. Part 2 Long-Distance Communications
  3. Part 3 Integrity in Communications and Newer Technology


  4. March 31, 2015


    Public-key Infrastructure (PKI)

    A public-key infrastructure (PKI) is the system required to provide public-key encryption and digital signature services. Its purpose is to manage encryption keys and certificates so that business transactions can be handled securely over the internet. In order for the public-key infrastructure to work effectively, there must always be some certificate authority (CA) available to verify the authenticity of the public key. This certificate authority can be private, or internal, to a company or a public outside trusted third party (TTP) like Verisign. PKI infrastructures support many services transparently to the user: public key certificates, certificate repositories, certificate revocation, key backup and recovery and histories, automatic updates for key pairs and certificates, cross-certification, non- repudiation of digital signatures and client- side software interacting reliably with all of the above.

    Public and private keys are made in pairs through the certificate authority (CA). Using asymmetric key pair encryption implies that whenever one key in the pair is used to encrypt data, the other must be used to decrypt it. The public key and the private key are mathematically dependent such that the public key can easily be created from the private key but the reversal of the public key to the private key would take literally thousands of years of computing to accomplish. Public keys are provided in a certificate signed with the CA's digital signature and private keys are never revealed. Client software must be configured to "trust" certificates from particular certificate authorities.

    Simply put, the two supported actions using PKI are as follows:

    1. To send an encrypted message, the sender uses the receiver's public key to encrypt. The receiver then uses his private key to decrypt the message.

    2. To send a digital signature, the sender uses his private key to encrypt. The receiver then uses the sender's public key to decrypt or "authenticate" the sender.

    A special thanks for researching this topic goes to:
    Robert Mavrinac
    Server & Network Technician
    School of Computer Science




    January 14, 2015:

    Examples of HTML Files.

    Here are the files we have been working with in class. The first is the skeleton file which you can use as a template. It is available here. When you add the HTML code for your web pages then you have to save it as an HTML file with your chosen file name. The next file is the example given in class which is saved as an HTML file with the necessary boilerplates. You can view it here.



    January 14, 2015:

    Welcome Students for the winter semester 2014.

    REMINDER: You must activate your WEBMAIL before Thursday, September 24th., 2014.



    January 14, 2015:

    E-mail Correspondence

    You must use ONLY "uwindsor.ca" e-mail accounts for course correspondence. E-mail sent from other accounts will be ignored and left unanswered.



    January 14, 2015:

    A former student of this class sent me a very interesting e-mail containing comments about this course. You should all read these comments. Please close the window when you are finished.



    January 14, 2015:

    A reminder that all text content on your Web-site must be in YOUR OWN WORDS. Copying text from other sources is strictly forbidden. You will receive a mark of 0/25 for the final project if you are caught--and you will be caught.



    [ Main Page ] [ Current News ] [ Course Information ] [ Teaching Assistants ] [ Class Lists ]
    [ Feedback ] [ Lecture Schedule ] [ Projects ] [ Download Utilities ] [ Help Pages ]

    Number of visits
    [counter]