USC CSD Home
 

Lectures -

 
Lecture Slides
(Please note that access to lecture notes is restricted.)
  • Lecture 1 (PDF) (6-up PDF) (Jan 15, 2008) - administrative stuff, hw1
  • Lecture 2 (PDF) (6-up PDF) (Jan 17, 2008) - hw1, introduction to security
  • Lecture 3 (PDF) (6-up PDF) (Jan 22, 2008) - introduction to security, cryptography
  • Lecture 4 (PDF) (6-up PDF) (Jan 24, 2008) - modeling strength of security protocols (lecture given by Ho Chung)
  • Lecture 5 (PDF) (6-up PDF) (Jan 29, 2008) - cryptography (permutation and substitution ciphers, stream ciphers)
  • Lecture 6 (PDF) (6-up PDF) (Jan 31, 2008) - hw2, cryptography (block ciphers)
  • Lecture 7 (PDF) (6-up PDF) (Feb 5, 2008) - cryptography (cryptanalysis, attacks, DES)
  • (Feb 7, 2008) - class canceled, instructor is out sick
  • Lecture 8 (PDF) (6-up PDF) (Feb 12, 2008) - cryptography (DES)
  • Lecture 9 (PDF) (6-up PDF) (Feb 14, 2008) - cryptography (AES), public-key cryptography (RSA)
  • Lecture 10 (PDF) (6-up PDF) (Feb 19, 2008) - public-key cryptography (other), digital signatures
  • Lecture 11 (PDF) (6-up PDF) (Feb 21, 2008) - cryptographic hash functions
  • Lecture 12 (PDF) (6-up PDF) (Feb 26, 2008) - hw3, one-time digital signatures, basic cryptographic protocols (key exchange)
  • Lecture 13 (PDF) (6-up PDF) (Feb 28, 2008) - basic cryptographic protocols (key exchange, authentication, multiple-key public-key cryptography, secret splitting, secret sharing)
  • Lecture 14 (PDF) (6-up PDF) (Mar 4, 2008) - extended Euclidean algorithm, intermediate cryptographic protocols (bit commitment)
  • (Mar 6, 2008) - midterm exam
  • Lecture 15 (PDF) (6-up PDF) (Mar 11, 2008) - intermediate cryptographic protocols (bit commitment, fair coin flips, timestamping)
  • Lecture 16 (Mar 13, 2008) - hw4
  • (Mar 18, 2008) - spring break
  • (Mar 20, 2008) - spring break
  • Lecture 17 (PDF) (6-up PDF) (Mar 25, 2008) - intermediate cryptographic protocols (subliminal channel, ElGamal signature, undeniable signature)
  • Lecture 18 (PDF) (6-up PDF) (Mar 27, 2008) - intermediate cryptographic protocols (designated confirmer signatures, proxy signatures, fail-stop digital signatures, group signatures, computing with encrypted data, one-way accumulators, key escrow)
  • Lecture 19 (PDF) (6-up PDF) (Apr 1, 2008) - intermediate cryptographic protocols (key escrow), advanced cryptographic protocols (zero knowledge proofs, blind signatures, ID-based PKC, oblivious transfer, simultaneous contract signing)
  • Lecture 20 (PDF) (6-up PDF) (Apr 3, 2008) - advanced cryptographic protocols (simultaneous contract signing), esoteric cryptographic protocols (secure multi-party computation, secure election, digital cash)
  • Lecture 21 (PDF) (6-up PDF) (Apr 8, 2008) - esoteric cryptographic protocols (digital cash, anonymous message broadcast), key management
  • Lecture 22 (PDF) (6-up PDF) (Apr 10, 2008) - key management
  • Lecture 23 (PDF) (6-up PDF) (Apr 15, 2008) - key management issues
  • Lecture 24 (PDF) (6-up PDF) (Apr 17, 2008) - key management issues, group key management
  • Lecture 25 (PDF) (6-up PDF) (Apr 22, 2008) - group key management, authentication
  • Lecture 26 (PDF) (6-up PDF) (Apr 24, 2008) - authentication, authentication in applications
  • Lecture 27 (PDF) (6-up PDF) (Apr 29, 2008) - authentication in applications, authorization
  • Lecture 28 (PDF) (6-up PDF) (May 1, 2008) - authorization, policy, intrusion detection, wireless

Preview:

  • (May 8, 2008) - final exam (firm)
 
Tentative Slides
The following are tentative slides (in PDF format) for this semester. They are subject to change without notice.
  • Administrative

  • Assignments-related

  • Introduction

  • Cryptography
    • secret-key cryptography (steganography, transposition and substitution ciphers, stream ciphers, one-time pad, block ciphers, DES, AES) (PDF) (6-up PDF)
    • public-key cryptography (RSA, extended Euclidean algorithm, Diffie-Hellman, ElGamal) (PDF) (6-up PDF)
    • digital signatures and cryptographic hash functions (PDF) (6-up PDF)

  • Cryptographic Protocols
    • basic cryptographic protocols (key exchange, authentication, multiple-key public-key cryptography, secret splitting, secret sharing) (PDF) (6-up PDF)
    • intermediate cryptographic protocols (bit commitment, fair coin flips, timestamping, subliminal channel, ElGamal signature, undeniable signature and other digital signature schemes, computing with encrypted data, one-way accumulators, key escrow) (PDF) (6-up PDF)
    • advanced cryptographic protocols (zero knowledge proofs, blind signatures, ID-based PKC, oblivious transfer, simultaneous contract signing) (PDF) (6-up PDF)
    • esoteric cryptographic protocols (secure multi-party computation, secure election, digital cash, anonymous message broadcast) (PDF) (6-up PDF)

  • Key Management

  • Authentication

  • Authorization

  • Intrusion Detection

  • Wireless

  • Privacy

  • Special Topics
 

   [Please see copyright regarding copying.]