USC CSD Home
 

Lectures - CSCI 530, Spring 2009

 
Lecture Slides
(Please note that access to lecture notes is restricted.)
  • Lecture 1 (PDF) (6-up PDF) (Jan 13, 2009) - administrative stuff, hw1
  • Lecture 2 (PDF) (6-up PDF) (Jan 15, 2009) - introduction to security
  • Lecture 3 (PDF) (6-up PDF) (Jan 20, 2009) - introduction to security, secret-key cryptography (steganography, permutation and substitution ciphers)
  • Lecture 4 (PDF) (6-up PDF) (Jan 22, 2009) - secret-key cryptography (symmetric-key and public-key ciphers, stream ciphers, one-time pad, RC4, block ciphers, key space vs. permutation space)
  • Lecture 5 (PDF) (6-up PDF) (Jan 27, 2009) - secret-key cryptography (cryptanalysis, attacks, DES)
  • Lecture 6 (PDF) (6-up PDF) (Jan 29, 2009) - secret-key cryptography (DES, modes of operations), hw2
  • Lecture 7 (PDF) (6-up PDF) (Feb 3, 2009) - secret-key cryptography (DES varients, AES), public-key cryptography
  • Lecture 8 (PDF) (6-up PDF) (Feb 5, 2009) - public-key cryptography (RSA, extended Euclidean algorithm, table method)
  • Lecture 9 (PDF) (6-up PDF) (Feb 10, 2009) - public-key cryptography (other), digital signatures and cryptographic hash functions
  • Lecture 10 (PDF) (6-up PDF) (Feb 12, 2009) - cryptographic hash functions, one-time digital signatures
  • Lecture 11 (PDF) (6-up PDF) (Feb 17, 2009) - Merkle's one-time digital signatures, basic cryptographic protocols (key exchange, authentication)
  • Lecture 12 (PDF) (6-up PDF) (Feb 19, 2009) - basic cryptographic protocols (multiple-key public-key cryptography, secret splitting, secret sharing)
  • Lecture 13 (PDF) (6-up PDF) (Feb 24, 2009) - hw3
  • Lecture 14 (PDF) (6-up PDF) (Feb 26, 2009) - intermediate cryptographic protocols (bit commitment, fair coin flips, timestamping, subliminal channel, ElGamal signature)
  • Lecture 15 (PDF) (6-up PDF) (Mar 3, 2009) - intermediate cryptographic protocols (ElGamal signature, undeniable signature and other digital signature schemes, computing with encrypted data, one-way accumulators)
  • (Mar 5, 2009) - midterm exam
  • Lecture 16 (PDF) (6-up PDF) (Mar 10, 2009) - intermediate cryptographic protocols (one-way accumulators, key escrow), advanced cryptographic protocols (zero knowledge proofs, blind signatures)
  • Lecture 17 (PDF) (6-up PDF) (Mar 12, 2009) - hw4, termpaper
  • (Mar 17, 2009) - spring break
  • (Mar 19, 2009) - spring break
  • Lecture 18 (PDF) (6-up PDF) (Mar 24, 2009) - advanced cryptographic protocols (blind signatures, ID-based PKC, oblivious transfer, simultaneous contract signing), esoteric cryptographic protocols (secure multi-party computation, secure election)
  • Lecture 19 (PDF) (6-up PDF) (Mar 26, 2009) - esoteric cryptographic protocols (secure election, digital cash, anonymous message broadcast), key management
  • Lecture 20 (PDF) (6-up PDF) (Mar 31, 2009) - key management
  • Lecture 21 (PDF) (6-up PDF) (Apr 2, 2009) - key management, key management issues
  • Lecture 22 (PDF) (6-up PDF) (Apr 7, 2009) - application of security - bistro
  • Lecture 23 (PDF) (6-up PDF) (Apr 9, 2009) - hw5, key management issues
  • Lecture 24 (PDF) (6-up PDF) (Apr 14, 2009) - group key management
  • Lecture 25 (PDF) (6-up PDF) (Apr 16, 2009) - group key management, authentication
  • Lecture 26 (PDF) (6-up PDF) (Apr 21, 2009) - authentication, authentication in applications
  • Lecture 27 (PDF) (6-up PDF) (Apr 23, 2009) - authentication in applications
  • Lecture 28 (PDF) (6-up PDF) (Apr 28, 2009) - authentication in applications, authorization
  • Lecture 29 (PDF) (6-up PDF) (Apr 30, 2009) - authorization, intrusion detection, wireless

Preview:

  • (May 12, 2009) - final exam (firm)
 
Tentative Slides
The following are tentative slides (in PDF format) for this semester. They are subject to change without notice.
 

[Last updated Sat Sep 19 2020]    [Please see copyright regarding copying.]