|
|
|
|
Lecture Slides
|
(Please note that access to lecture notes is restricted.)
- Lecture 1
(PDF)
(6-up PDF)
(Jan 9, 2006)
- administrative stuff
- Lecture 2
(PDF)
(6-up PDF)
(Jan 11, 2006)
- hw1, introduction
- (Jan 16, 2006) - holiday
- Lecture 3
(PDF)
(6-up PDF)
(Jan 18, 2006)
- introduction, cryptography (basic ciphers)
- Lecture 4
(PDF)
(6-up PDF)
(Jan 23, 2006)
- cryptography (stream ciphers, cryptanalysis)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 25, 2006)
- cryptography (DES)
- Lecture 6
(PDF)
(6-up PDF)
(Jan 30, 2006)
- hw2, cryptography (DES, AES)
- Lecture 7
(PDF)
(6-up PDF)
(Feb 1, 2006)
- public-key cryptography (RSA, Diffe-Hellman)
- Lecture 8
(PDF)
(6-up PDF)
(Feb 6, 2006)
- public-key cryptography (digital signature, cryptographic hash function,
message authentication code)
- Lecture 9
(PDF)
(6-up PDF)
(Feb 8, 2006)
- public-key cryptography (one-time signature), key management
(Needham-Schroeder)
- Lecture 10
(PDF)
(6-up PDF)
(Feb 13, 2006)
- key management (Needham-Schroeder, Kerberos, public-key certificate)
- Lecture 11
(PDF)
(6-up PDF)
(Feb 15, 2006)
- key management (choosing keys, storing keys, distributing keys)
- (Feb 20, 2006) - holiday
- Lecture 12
(PDF)
(6-up PDF)
(Feb 22, 2006)
- key management, visual cryptography
- Lecture 13
(PDF)
(6-up PDF)
(Feb 27, 2006)
- key management
- Lecture 14
(Mar 1, 2006)
- hw4
- (Mar 6, 2006) - exam 1
- Lecture 15
(PDF)
(6-up PDF)
(Mar 8, 2006)
- key management (group key management)
- (Mar 13, 2006) - spring break
- (Mar 15, 2006) - spring break
- Lecture 16
(PDF)
(6-up PDF)
(Mar 20, 2006)
- key management (group key management)
- Lecture 17
(PDF)
(6-up PDF)
(Mar 22, 2006)
- key management (group key management), authentication
- Lecture 18
(PDF)
(6-up PDF)
(Mar 27, 2006)
- authentication, authentication in applications
- Lecture 19
(PDF)
(6-up PDF)
(Mar 29, 2006)
- authentication in applications
- (Apr 3, 2006) - class canceled
- Lecture 20
(PDF)
(6-up PDF)
(Apr 5, 2006)
- authentication in applications
- Lecture 21
(PDF)
(6-up PDF)
(Apr 10, 2006)
- authorization, policy
- Lecture 22
(PDF)
(6-up PDF)
(Apr 12, 2006)
- authorization (policy)
- Lecture 23
(PDF)
(6-up PDF)
(Apr 17, 2006)
- intrusion detection
- Lecture 24
(PDF)
(6-up PDF)
(Apr 19, 2006)
- wireless, upload (bistro)
- Lecture 25
(PDF)
(6-up PDF)
(Apr 24, 2006)
- upload (bistro), privacy
Preview:
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
They are subject to change without notice.
|
|
|