Advanced Information and Network Security
Overview:
Lecturer: Professor Trappe The Course Syllabus can be downloaded from here. |
Date |
Lecture Material |
Assignments |
09/04/2007 |
Class Syllabus Lecture 1: Classical Crypto |
Chapter 2: 2, 4, 5, 15 Chapter 2, Computer Problems: 2, 6 Chapter 3: 1 |
09/11/2007 |
Quiz 1 Lecture 2: Symmetric Crypto Lecture 3: RSA and Number Theory |
Chapter 4: 1, 3, 4 Chapter 6: 1, 2, 8 |
09/18/2007 |
Quiz 2 Lecture 4: Information Theory Lecture 5: DLOG and Authentication Note: Do not worry about attack-related issues in Ch 7,9. Also, this week we will not cover Chapter 8 |
Chapter 15: 3, 6, 10 Chapter 7: 1, 11 Chapter 9: 4, 5 |
09/25/2007 |
Quiz 3 This week, we *will* cover Chapter 8. We will also go back and discuss cryptanalysis and cryptographic protocol failures Lecture 6: Cryptanalysis |
Homework 1 and 2 Solutions Chapter 8: 1, 3, 9 Chapter 6: 12, 16, 17 |
10/2/2007 |
Quiz 4 Whiteboard Lecture on Secret Sharing (Chapter 12) We then move onto security protocols Our starting point will be Chapter 10 in Trappe and Washington, and Chapter 9 in Bishop |
Chapter 12: 2, 5, 9 Chapter 10: 4, 6 |
10/9/2007 |
Quiz 5 Security Protocols slides Abadi + Needham’s paper |
|
10/16/2007 |
Last Quiz! Yay! Slides from 802.11 security Borisov and Wagner paper |
|
10/23/2007 |
SSL Slides SSL Version 3 Homepage SSL Attack paper by Wagner |
|
10/30/2007 |
Access Control slides Lattice-based Models Formal Models for Security paper |
|
11/6/2007 |
White-board lecture on multicast key management and authentication Related Paper: Staggered TESLA |
|
Most of November |
White board lectures |
|
12/4/2007 |
Last lecture: Adversary models for security (and Zero Knowledge Proofs), slides. Paper: Byzantine Routing |
|
12/10/2007 |
Last class meeting: Student presentations |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|