|
|
|
|
Lecture Slides
|
(Please note that access to lecture notes is restricted.)
- Lecture 1
(PDF)
(6-up PDF)
(Jan 12, 2010)
- administrative stuff
- Lecture 2
(PDF)
(6-up PDF)
(Jan 14, 2010)
- hw1, introduction to security systems
- Lecture 3
(PDF)
(6-up PDF)
(Jan 19, 2010)
- introduction to security systems
- Lecture 4
(PDF)
(6-up PDF)
(Jan 21, 2010)
- secret-key cryptography (steganography, transposition and
substitution ciphers)
- Lecture 5
(PDF)
(6-up PDF)
(Jan 26, 2010)
- secret-key cryptography (stream ciphers, one-time pad, block ciphers)
- Lecture 6
(PDF)
(6-up PDF)
(Jan 28, 2010)
- secret-key cryptography (DES), hw2
- Lecture 7
(PDF)
(6-up PDF)
(Feb 2, 2010)
- secret-key cryptography (DES, AES), public-key cryptography
- Lecture 8
(PDF)
(6-up PDF)
(Feb 4, 2010)
- public-key cryptography (RSA, extended Euclidean algorithm)
- Lecture 9
(PDF)
(6-up PDF)
(Feb 9, 2010)
- public-key cryptography (Diffie-Hellman, ElGamal, digital signatures)
- Lecture 10
(PDF)
(6-up PDF)
(Feb 11, 2010)
- cryptographic hash functions
- Lecture 11
(PDF)
(6-up PDF)
(Feb 16, 2010)
- cryptographic hash functions, basic cryptographic protocols
- Lecture 12
(PDF)
(6-up PDF)
(Feb 18, 2010)
- hw3
- Lecture 13
(PDF)
(6-up PDF)
(Feb 23, 2010)
- basic cryptographic protocols
(key exchange, authentication, multiple-key public-key cryptography,
secret splitting, secret sharing)
- Lecture 14
(PDF)
(6-up PDF)
(Feb 25, 2010)
- basic cryptographic protocols, termpaper
- Lecture 15
(PDF)
(6-up PDF)
(Mar 2, 2010)
- intermediate cryptographic protocols (bit commitment, fair coin flips, timestamping)
- (Mar 4, 2010) - midterm exam (firm)
- Lecture 16
(PDF)
(6-up PDF)
(Mar 9, 2010)
- intermediate cryptographic protocols (subliminal channel, ElGamal signature,
undeniable signature and other digital signature schemes, computing with encrypted data)
- Lecture 17
(PDF)
(6-up PDF)
(Mar 11, 2010)
- hw4, intermediate cryptographic protocols (one-way accumulators)
- (Mar 16, 2010) - spring break
- (Mar 18, 2010) - spring break
- Lecture 18
(PDF)
(6-up PDF)
(Mar 23, 2010)
- intermediate cryptographic protocols (key escrow),
advanced cryptographic protocols (zero knowledge proofs, blind signatures, ID-based PKC)
- Lecture 19
(PDF)
(6-up PDF)
(Mar 25, 2010)
- advanced cryptographic protocols (oblivious transfer, simultaneous contract signing),
esoteric cryptographic protocols (secure multi-party computation, secure election)
- Lecture 20
(PDF)
(6-up PDF)
(Mar 30, 2010)
- esoteric cryptographic protocols (digital cash, anonymous message broadcast), key management
- Lecture 21
(PDF)
(6-up PDF)
(Apr 1, 2010)
- key management, part 1 (key management mechanisms)
- Lecture 22
(PDF)
(6-up PDF)
(Apr 6, 2010)
- key management, part 2 (key management issues)
- Lecture 23
(PDF)
(6-up PDF)
(Apr 8, 2010)
- hw5, key management, part 3 (group key management)
- Lecture 24
(PDF)
(6-up PDF)
(Apr 13, 2010)
- key management, part 3 (group key management), authentication
- Lecture 25
(PDF)
(6-up PDF)
(Apr 15, 2010)
- authentication
- Lecture 26
(PDF)
(6-up PDF)
(Apr 20, 2010)
- authentication, authentication in applications
- Lecture 27
(PDF)
(6-up PDF)
(Apr 22, 2010)
- authentication in applications
- Lecture 28
(PDF)
(6-up PDF)
(Apr 27, 2010)
- authorization, parts 1 & 2
- Lecture 29
(PDF)
(6-up PDF)
(Apr 29, 2010)
- authorization part 2, intrusion detection, wireless
Preview:
- (May 11, 2010) - final exam (firm)
|
|
Tentative Slides
|
The following are tentative slides (in PDF format) for this semester.
They are subject to change without notice.
- Administrative
- Assignments-related
- Introduction
- Cryptography
- secret-key cryptography
(steganography, transposition and substitution ciphers,
stream ciphers, one-time pad, block ciphers, DES, AES)
(PDF)
(6-up PDF)
- public-key cryptography
(RSA, extended Euclidean algorithm, Diffie-Hellman, ElGamal)
(PDF)
(6-up PDF)
- digital signatures & cryptographic hash functions
(PDF)
(6-up PDF)
- Cryptographic Protocols
- basic cryptographic protocols
(key exchange, authentication, multiple-key public-key cryptography,
secret splitting, secret sharing)
(PDF)
(6-up PDF)
- intermediate cryptographic protocols
(bit commitment, fair coin flips, timestamping, subliminal channel,
ElGamal signature,
undeniable signature and other digital signature schemes,
computing with encrypted data, one-way accumulators, key escrow)
(PDF)
(6-up PDF)
- advanced cryptographic protocols
(zero knowledge proofs, blind signatures, ID-based PKC,
oblivious transfer, simultaneous contract signing)
(PDF)
(6-up PDF)
- esoteric cryptographic protocols
(secure multi-party computation, secure election, digital cash,
anonymous message broadcast)
(PDF)
(6-up PDF)
- Key Management
- ,Authentication
- Authorization
- Intrusion Detection
- Wireless
- Privacy (skipped for this semester)
- Special Topics
|
|
|