Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lesson
Complete and continue
The Cryptographic Foundations of Plug & Charge
Module 1: The Cryptographic Foundations of Plug & Charge
1. The Three Pillars of IT Security (8:57)
2. Exchanging Symmetric Keys - The Diffie-Hellman Protocol (8:22)
3. Asymmetric Cryptosystems and Elliptic Curve Cryptography (15:17)
4. Secure Hashes and Digital Signatures (10:50)
5. Digital Certificates (11:11)
6. Hands-on Session: How to Use OpenSSL for Basic Cryptographic Operations (20:43)
7. E-Mobility Market Roles in the Charging and Billing Process (6:12)
8. Introducing the Public-Key Infrastructures of ISO 15118 (13:58)
9. PKI Structure Continued and the Reason Behind the CPS Role (15:03)
10. Hands-on Session: Digital Certificates and Signatures with OpenSSL (18:22)
11. Hands-on Session: Creating a Certificate Chain of Trust with OpenSSL (14:54)
9. PKI Structure Continued and the Reason Behind the CPS Role
Lesson contents locked
If you're already enrolled,
you'll need to login
.
Join Course to Unlock