Usage:

Please first press three or four times [Ctrl]-[+] to resize the layout.

Clicking into the right top corner (page number area) jumps to the next page.

Clicking into the left top corner (slot logo area) jumps to the previous page.

Here we go.

For printing the contents simply use the print function of your browser.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

WWU

Cryptography and certificates

1

ca. 90 min.

Cryptography and Certificates

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

2

Communication problems

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

3

Cryptography as problem solution

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

4

Symmetric cryptography (secret key systems)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

5

Properties of secret key systems

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

6

Asymmetric Cryptography (public key systems)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

7

Public key systems: When which key?

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

8

How do public key systems help?

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

9

Properties of public key systems

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

10

Cryptographic essences (fingerprints)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

11

Combine systems for speed – sign and verify

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

12

Combine systems for speed – encrypt and decrypt

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

13

Summary

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

14

How do I get somebody's public key?

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

15

Certificates

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

16

How to check certificates

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

17

Certification chains / hierarchies

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

18

How to become a Root CA

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

19

How to become a serious root CA

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

20

Zertifizierungsstelle der Universität Münster (WWUCA)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

21

DFN PKI

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

22

DFN PKI hierarchies

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

23

How to get a personal certificate

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

24

How does the WWUCA issue a certificate? (1)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

25

How does the WWUCA issue a certificate? (2)

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

26

Distinguished Names (X.500 DNs) in WWUCA certificates

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

27

E-mail addresses and host names in WWUCA certificates

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

28

When to use a certificate

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

29

Tomorrow

  • Bring the printed and signed „Zertifikatantrag für ein Nutzerzertifikat“

  • Bring your valid identity card or passport

    • Driving licence, student card, or other documents are not accepted!

    • Expired documents are not accepted!

    • Only accepted German documents: Personalausweis, Reisepass, Aufenthaltstitel

Rainer Perske, 2017-01-09

WWU

Cryptography and certificates

30

Thank you

  • Rainer Perske

  • Westfälische Wilhelms-Universität
    Zentrum für Informationsverarbeitung
    Zertifizierungsstelle
    Röntgenstraße 7-13
    48149 Münster

  • ca@uni-muenster.de
    +49 251 83 31590 (fon)
    +49 251 83 31555 (fax)

Rainer Perske, 2017-01-09

© 2011-2017 Rainer Perske und Universität Münster