USC CSD Home
 

Lectures - CSCI 530, Spring 2010

 
Lecture Slides
(Please note that access to lecture notes is restricted.)
  • Lecture 1 (PDF) (6-up PDF) (Jan 12, 2010) - administrative stuff
  • Lecture 2 (PDF) (6-up PDF) (Jan 14, 2010) - hw1, introduction to security systems
  • Lecture 3 (PDF) (6-up PDF) (Jan 19, 2010) - introduction to security systems
  • Lecture 4 (PDF) (6-up PDF) (Jan 21, 2010) - secret-key cryptography (steganography, transposition and substitution ciphers)
  • Lecture 5 (PDF) (6-up PDF) (Jan 26, 2010) - secret-key cryptography (stream ciphers, one-time pad, block ciphers)
  • Lecture 6 (PDF) (6-up PDF) (Jan 28, 2010) - secret-key cryptography (DES), hw2
  • Lecture 7 (PDF) (6-up PDF) (Feb 2, 2010) - secret-key cryptography (DES, AES), public-key cryptography
  • Lecture 8 (PDF) (6-up PDF) (Feb 4, 2010) - public-key cryptography (RSA, extended Euclidean algorithm)
  • Lecture 9 (PDF) (6-up PDF) (Feb 9, 2010) - public-key cryptography (Diffie-Hellman, ElGamal, digital signatures)
  • Lecture 10 (PDF) (6-up PDF) (Feb 11, 2010) - cryptographic hash functions
  • Lecture 11 (PDF) (6-up PDF) (Feb 16, 2010) - cryptographic hash functions, basic cryptographic protocols
  • Lecture 12 (PDF) (6-up PDF) (Feb 18, 2010) - hw3
  • Lecture 13 (PDF) (6-up PDF) (Feb 23, 2010) - basic cryptographic protocols (key exchange, authentication, multiple-key public-key cryptography, secret splitting, secret sharing)
  • Lecture 14 (PDF) (6-up PDF) (Feb 25, 2010) - basic cryptographic protocols, termpaper
  • Lecture 15 (PDF) (6-up PDF) (Mar 2, 2010) - intermediate cryptographic protocols (bit commitment, fair coin flips, timestamping)
  • (Mar 4, 2010) - midterm exam (firm)
  • Lecture 16 (PDF) (6-up PDF) (Mar 9, 2010) - intermediate cryptographic protocols (subliminal channel, ElGamal signature, undeniable signature and other digital signature schemes, computing with encrypted data)
  • Lecture 17 (PDF) (6-up PDF) (Mar 11, 2010) - hw4, intermediate cryptographic protocols (one-way accumulators)
  • (Mar 16, 2010) - spring break
  • (Mar 18, 2010) - spring break
  • Lecture 18 (PDF) (6-up PDF) (Mar 23, 2010) - intermediate cryptographic protocols (key escrow), advanced cryptographic protocols (zero knowledge proofs, blind signatures, ID-based PKC)
  • Lecture 19 (PDF) (6-up PDF) (Mar 25, 2010) - advanced cryptographic protocols (oblivious transfer, simultaneous contract signing), esoteric cryptographic protocols (secure multi-party computation, secure election)
  • Lecture 20 (PDF) (6-up PDF) (Mar 30, 2010) - esoteric cryptographic protocols (digital cash, anonymous message broadcast), key management
  • Lecture 21 (PDF) (6-up PDF) (Apr 1, 2010) - key management, part 1 (key management mechanisms)
  • Lecture 22 (PDF) (6-up PDF) (Apr 6, 2010) - key management, part 2 (key management issues)
  • Lecture 23 (PDF) (6-up PDF) (Apr 8, 2010) - hw5, key management, part 3 (group key management)
  • Lecture 24 (PDF) (6-up PDF) (Apr 13, 2010) - key management, part 3 (group key management), authentication
  • Lecture 25 (PDF) (6-up PDF) (Apr 15, 2010) - authentication
  • Lecture 26 (PDF) (6-up PDF) (Apr 20, 2010) - authentication, authentication in applications
  • Lecture 27 (PDF) (6-up PDF) (Apr 22, 2010) - authentication in applications
  • Lecture 28 (PDF) (6-up PDF) (Apr 27, 2010) - authorization, parts 1 & 2
  • Lecture 29 (PDF) (6-up PDF) (Apr 29, 2010) - authorization part 2, intrusion detection, wireless

Preview:

  • (May 11, 2010) - final exam (firm)
 
Tentative Slides
The following are tentative slides (in PDF format) for this semester. They are subject to change without notice.
 

[Last updated Sat Sep 19 2020]    [Please see copyright regarding copying.]