nIntroduction
nDNSSEC mechanisms
uto authenticate servers (TSIG / SIG0)
uto establish authenticity and integrity of
data
FQuick overview
FNew RRs
FUsing public key cryptography to sign a single
zone
FDelegating signing authority ; building chains
of trust
FKey exchange and rollovers
nConclusions
n