|
|
|
|
Lecture Slides
|
(Please note that access to lecture notes is restricted.)
- Lecture 1
(PDF)
(6-up PDF)
(Jan 13, 2009)
- administrative stuff, hw1
- Lecture 2
(PDF)
(6-up PDF)
(Jan 15, 2009)
- introduction to security
- Lecture 3
(PDF)
(6-up PDF)
(Jan 20, 2009)
- introduction to security, secret-key cryptography (steganography,
permutation and substitution ciphers)
- Lecture 4
(PDF)
(6-up PDF)
(Jan 22, 2009)
- secret-key cryptography (symmetric-key and public-key ciphers,
stream ciphers, one-time pad, RC4, block ciphers,
key space vs. permutation space)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 27, 2009)
- secret-key cryptography (cryptanalysis, attacks, DES)
- Lecture 6
(PDF)
(6-up PDF)
(Jan 29, 2009)
- secret-key cryptography (DES, modes of operations), hw2
- Lecture 7
(PDF)
(6-up PDF)
(Feb 3, 2009)
- secret-key cryptography (DES varients, AES), public-key cryptography
- Lecture 8
(PDF)
(6-up PDF)
(Feb 5, 2009)
- public-key cryptography (RSA, extended Euclidean algorithm, table method)
- Lecture 9
(PDF)
(6-up PDF)
(Feb 10, 2009)
- public-key cryptography (other), digital signatures and
cryptographic hash functions
- Lecture 10
(PDF)
(6-up PDF)
(Feb 12, 2009)
- cryptographic hash functions, one-time digital signatures
- Lecture 11
(PDF)
(6-up PDF)
(Feb 17, 2009)
- Merkle's one-time digital signatures, basic cryptographic protocols
(key exchange, authentication)
- Lecture 12
(PDF)
(6-up PDF)
(Feb 19, 2009)
- basic cryptographic protocols (multiple-key public-key cryptography,
secret splitting, secret sharing)
- Lecture 13
(PDF)
(6-up PDF)
(Feb 24, 2009)
- hw3
- Lecture 14
(PDF)
(6-up PDF)
(Feb 26, 2009)
- intermediate cryptographic protocols (bit commitment, fair coin flips,
timestamping, subliminal channel, ElGamal signature)
- Lecture 15
(PDF)
(6-up PDF)
(Mar 3, 2009)
- intermediate cryptographic protocols (ElGamal signature,
undeniable signature and other digital signature schemes,
computing with encrypted data, one-way accumulators)
- (Mar 5, 2009) - midterm exam
- Lecture 16
(PDF)
(6-up PDF)
(Mar 10, 2009)
- intermediate cryptographic protocols (one-way accumulators,
key escrow), advanced cryptographic protocols (zero knowledge proofs,
blind signatures)
- Lecture 17
(PDF)
(6-up PDF)
(Mar 12, 2009)
- hw4, termpaper
- (Mar 17, 2009) - spring break
- (Mar 19, 2009) - spring break
- Lecture 18
(PDF)
(6-up PDF)
(Mar 24, 2009)
- advanced cryptographic protocols (blind signatures, ID-based PKC,
oblivious transfer, simultaneous contract signing),
esoteric cryptographic protocols (secure multi-party computation,
secure election)
- Lecture 19
(PDF)
(6-up PDF)
(Mar 26, 2009)
- esoteric cryptographic protocols (secure election, digital cash,
anonymous message broadcast), key management
- Lecture 20
(PDF)
(6-up PDF)
(Mar 31, 2009)
- key management
- Lecture 21
(PDF)
(6-up PDF)
(Apr 2, 2009)
- key management, key management issues
- Lecture 22
(PDF)
(6-up PDF)
(Apr 7, 2009)
- application of security - bistro
- Lecture 23
(PDF)
(6-up PDF)
(Apr 9, 2009)
- hw5, key management issues
- Lecture 24
(PDF)
(6-up PDF)
(Apr 14, 2009)
- group key management
- Lecture 25
(PDF)
(6-up PDF)
(Apr 16, 2009)
- group key management, authentication
- Lecture 26
(PDF)
(6-up PDF)
(Apr 21, 2009)
- authentication, authentication in applications
- Lecture 27
(PDF)
(6-up PDF)
(Apr 23, 2009)
- authentication in applications
- Lecture 28
(PDF)
(6-up PDF)
(Apr 28, 2009)
- authentication in applications, authorization
- Lecture 29
(PDF)
(6-up PDF)
(Apr 30, 2009)
- authorization, intrusion detection, wireless
Preview:
- (May 12, 2009) - final exam (firm)
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
They are subject to change without notice.
- Administrative
- Assignments-related
- Introduction
- Cryptography
- secret-key cryptography
(steganography, transposition and substitution ciphers,
stream ciphers, one-time pad, block ciphers, DES, AES)
(PDF)
(6-up PDF)
- public-key cryptography
(RSA, extended Euclidean algorithm, Diffie-Hellman, ElGamal)
(PDF)
(6-up PDF)
- digital signatures and cryptographic hash functions
(PDF)
(6-up PDF)
- Cryptographic Protocols
- basic cryptographic protocols
(key exchange, authentication, multiple-key public-key cryptography,
secret splitting, secret sharing)
(PDF)
(6-up PDF)
- intermediate cryptographic protocols
(bit commitment, fair coin flips, timestamping, subliminal channel,
ElGamal signature,
undeniable signature and other digital signature schemes,
computing with encrypted data, one-way accumulators, key escrow)
(PDF)
(6-up PDF)
- advanced cryptographic protocols
(zero knowledge proofs, blind signatures, ID-based PKC,
oblivious transfer, simultaneous contract signing)
(PDF)
(6-up PDF)
- esoteric cryptographic protocols
(secure multi-party computation, secure election, digital cash,
anonymous message broadcast)
(PDF)
(6-up PDF)
- Key Management
- ,Authentication
- Authorization
- Intrusion Detection
- Wireless
- Privacy (skipped for this semester)
- Special Topics
|
|
|