equal
deleted
inserted
replaced
8 |
8 |
9 \HEADER |
9 \HEADER |
10 |
10 |
11 \begin{enumerate} |
11 \begin{enumerate} |
12 \item Explain briefly the purpose of the certification authority in |
12 \item Explain briefly the purpose of the certification authority in |
13 the public-private key encryption scheme. |
13 the public-private key encryption scheme. |
14 |
14 |
15 \item Explain briefly what is meant by a certification authority |
15 \item Explain briefly what is meant by a certification authority |
16 becoming ``too big to fail'' when it has issued a large number |
16 becoming ``too big to fail'' when it has issued a large number |
17 of certificates. |
17 of certificates. |
18 |
18 |
19 \item In which situations does it make sense to install |
19 \item In which situations does it make sense to install |
20 invalid (self-signed) certificates? |
20 invalid (self-signed) certificates? |
|
21 |
21 |
22 |
22 %\item Zero-knowledge protocols depend on three main properties called |
23 %\item Zero-knowledge protocols depend on three main properties called |
23 % completeness, soundness and zero-knowledge. Explain what they mean? |
24 % completeness, soundness and zero-knowledge. Explain what they mean? |
24 |
25 |
25 %\item Why do zero-knowledge protocols require an NP-problem as building |
26 %\item Why do zero-knowledge protocols require an NP-problem as building |