CSE539 -- Applied Cryptography,
Spring 2017
Disclaimer:
This is
a set of bullet points, class slides, and audio, that summarizes the class
coverage of material. By no means is this comprehensive or is a substitute for
class notes and attendance. Also, updating of this page is not guaranteed to be
frequent.
This page will be updated as class progresses....
Note:
Audio files cannot be downloaded when off campus, unless if you use ASU VPN.
|Thank you firewall|
If you are unable to open JNT files on Windows – check out this link
Class 1:
·
Introduction
·
Administrivia,
Cryptography, Grading, Course contents
·
Number
Theory
·
Course
topics
Class 2:
·
Basic
Crypto Functions
·
Large
numbers
·
Random
numbers
·
Hash
functions
·
Encryption
basics
Class 3:
·
Encryption
history
·
Basic
operations (P-Box, S-Box, etc)
·
Permutation
Substitution networks
Class 4:
·
Feistel
Networks
·
Cipher
modes: ECB-CBC-CFB-OFB-Counter
·
DES….
DES Specs, DES info, DES slides
·
AES…. AES Operations
Class 5:
·
Assignment
1 discussion
·
RC4
- details
·
Random
Numbers and Generation
Class 6:
·
CSPRNG
(what and how)
·
Hash
functions … slides, explanations,
more
·
MD-5
Class 7:
·
SHA-1
and more
·
Birthday
attacks
·
The
key exchange problem
·
Merkle’s
Puzzles explanation
Class 8:
·
Diffie
Helman Key exchange
·
MITM
attacks
·
RSA
Class 9:
·
Steganography
·
RSA
continued
·
Uses
for RSA
Class 10:
·
Passwords
and password storage
·
Salt
·
Dictionary
attacks (online and offline)
·
Rainbow
tables
Class 11:
·
Rainbow
tables
·
Crypto
Protocols and properties
·
Kerberos
-- protocol
Class 12:
·
Kerberos
-- protocol
·
Multifactor
Authentication
·
Authentication
algorithms and cards
Class 13:
·
Secret
Communications
·
Privacy—authentication—Integrity
·
Public
Key encryption, double encryption, MITM, Interlock
·
Using
MAC for integrity and authentication –
·
Hybrid
encryption for secure communication
Class 14:
·
Secret
Communications …contd
·
Digital
Signatures
·
Digital
Certificates
·
Root
Certificates – for Certificate Authorities
Class 15:
·
Root
of trust
·
CA
and certificates
·
Hierarchical
Certificates
·
Web
of Trust
·
Mid Term Exam: March 2nd
2017
Class 16:
·
Certificates
and attacks
·
SSL
Description, SSL specs, slides,
·
Attacks
in SSL
Class 17:
·
Computer
Security
·
Vulnerabilities
Class 18:
·
Vulnerabilties
·
Ken
Thompson Reflections on Trusting
Trust – also another
look at it
·
Computer
Security problems, design issues and software interactions
Class 19:
·
Privacy
·
RSA
– number theory – RSA proof in PDF
Class 20:
·
RSA
continued
·
Primality
Testing
Class 21:
·
Primality
Testing
·
Commutative
Encryption
·
Homomorphic
Encryption
·
Mental
Poker
·
Bit
commitment
Class 22:
·
Oblivious
Transfer
·
MIXnets
·
Dining
Cryptographers
·
Secure
Multiparty computation
·
Secret
Splitting
·
Secret
Sharing
Class 23:
·
Timestamping
·
Millionaires
and Socialist Millionaires problem
·
Existential
Forgery
·
Proxy
Signatures
·
Group
Signatures
·
Fail
Stop Signatures
·
Blind
Signatures
Class 24:
·
Off the record Messaging (OTR) 1. OTR Page 2. OTR protocol 3. Explanation
Class 25:
·
OTR symmetric keys
·
Randomized Response technique
·
Subliminal Channels
·
Bitcoin
Class 26:
·
Bitcoin
·
Zero Knowledge Proofs
·
Feige-Fiat-Shamir proof of identity
Class 27:
·
ECC -- 1. simple
explanation, 2. good
video
·
Anonymous Money Orders
·
Secure Elections
Class 28:
·
Digital Cash
Class 29:
·
Review
Final
Exam: May 2nd, at 2:30pm in classroom