CSE539 -- Applied Cryptography, Spring 2017

Disclaimer:

This is a set of bullet points, class slides, and audio, that summarizes the class coverage of material. By no means is this comprehensive or is a substitute for class notes and attendance. Also, updating of this page is not guaranteed to be frequent.

Note: Audio files cannot be downloaded when off campus, unless if you use ASU VPN. |Thank you firewall|

If you are unable to open JNT files on Windows – check out this link

Class 1:

·         Introduction

·         Number Theory

·         Course topics

·          |notes| PDF |audio|

Class 2:

·         Kerckhoffs Principle

·         Basic Crypto Functions

·         Large numbers

·         Random numbers

·         Hash functions

·         Encryption basics

·          |notes| PDF |audio|

Class 3:

·         Encryption history

·         Basic operations (P-Box, S-Box, etc)

·         Permutation Substitution networks

·         |notes| PDF |audio|

Class 4:

·         Feistel Networks

·         Cipher modes: ECB-CBC-CFB-OFB-Counter

·         DES….

·         AES….

·         |notes| PDF |audio|

Class 5:

·         Assignment 1 discussion

·         RC4 - details

·         Random Numbers and Generation

·         |notes| PDF |audio|

Class 6:

·         CSPRNG (what and how)

·         Hash functions … slides, explanations, more

·         MD-5

·         |notes| PDF |no audio|

Class 7:

·         SHA-1 and more

·         Birthday attacks

·         The key exchange problem

·         Merkle’s Puzzles explanation

·         |notes| PDF |audio|

Class 8:

·         Diffie Helman Key exchange

·         MITM attacks

·         RSA

·         |notes| PDF |audio|

Class 9:

·         Steganography

·         RSA continued

·         Uses for RSA

·         |notes| PDF |audio|

Class 10:

·         Salt

·         Dictionary attacks (online and offline)

·         Rainbow tables

·         |notes| PDF |audio|

Class 11:

·         Rainbow tables

·         Crypto Protocols and properties

·         Kerberos -- protocol

·         |notes| PDF |audio|

Class 12:

·         Kerberos -- protocol

·         Multifactor Authentication

·         Authentication algorithms and cards

·         |notes| PDF |audio|

Class 13:

·         Secret Communications

·         Privacy—authentication—Integrity

·         Public Key encryption, double encryption, MITM, Interlock

·         Using MAC for integrity and authentication –

·         Hybrid encryption for secure communication

·         |notes| PDF |audio|

Class 14:

·         Secret Communications …contd

·         Digital Signatures

·         Digital Certificates

·         Root Certificates – for Certificate Authorities

·         |notes| PDF |audio|

Class 15:

·         Root of trust

·         CA and certificates

·         Hierarchical Certificates

·         Web of Trust

·         |notes| PDF |audio|

·        Mid Term Exam: March 2nd 2017

Class 16:

·         Certificates and attacks

·

·         Attacks in SSL

·         |notes| PDF |audio|

Class 17:

·         Computer Security

·         Vulnerabilities

·         |notes| PDF |no audio|

Class 18:

·         Vulnerabilties

·         Ken Thompson Reflections on Trusting Trustalso another look at it

·         Computer Security problems, design issues and software interactions

·         |notes| PDF |audio|

Class 19:

·         Privacy

·         RSA – number theory – RSA proof in PDF

·         |notes| PDF |no audio|

Class 20:

·         RSA continued

·         Primality Testing

·         |notes| PDF |audio|

Class 21:

·         Primality Testing

·         Commutative Encryption

·         Homomorphic Encryption

·         Mental Poker

·         Bit commitment

·         |notes| PDF |audio|

Class 22:

·         Oblivious Transfer

·         MIXnets

·         Dining Cryptographers

·         Secure Multiparty computation

·         Secret Splitting

·         Secret Sharing

·         |notes| PDF |audio|

Class 23:

·         Timestamping

·         Millionaires and Socialist Millionaires problem

·         Existential Forgery

·         Proxy Signatures

·         Group Signatures

·         Fail Stop Signatures

·         Blind Signatures

·         |notes| PDF |audio|

Class 24:

·         Off the record Messaging (OTR) 1. OTR Page 2. OTR protocol 3. Explanation

·         |notes| PDF |audio|

Class 25:

·         OTR symmetric keys

·         Randomized Response technique

·         Subliminal Channels

·         Bitcoin

·         |notes| PDF |audio|

Class 26:

·         Bitcoin

·         Zero Knowledge Proofs

·         Feige-Fiat-Shamir proof of identity

·         |notes| PDF |audio|

Class 27:

·         ECC -- 1. simple explanation, 2. good video

·         Anonymous Money Orders

·         Secure Elections

·         |notes| PDF |audio|

Class 28:

·         Digital Cash

·         |notes| PDF |audio|

Class 29:

·         Review

·         |notes| PDF |audio|

Final Exam: May 2nd, at 2:30pm in classroom