Class 1:
 | Introduction
|
 | Information Characteristics and Privacy
|
 | Encryption -- symmetric and asymmetric
|
 | Vulnerabilities
|
 | Security and Cryptography
|
 | Number theory |
Class 2:
 | Trend in internet crime/hacking
|
 | Vulnerabilities - viruses, spam, id theft, buffer overflow
|
 | Countermeasures and Security Procedures
|
 | Trust and software,
Ken Thompson
lecture |
Class 3:
 | Information Security -- confidentiality and integrity
|
 | Coin tossing on Telephone (hashing)
|
 | Cryptography Basics (encryption, XOR) |
 | Brute Force breaking
|
 | Hashing, Random Numbers
|
 | Cryptographic Functions (authentication, access control,
signatures, certificates, secret sharing, zero knowledge proofs,
secure elections, digital cash) |
Class 4:
 | RFID and weak challenge response in DST cards (see)
|
 | DES brute force cracking
|
 | Ceaser cipher, Affine Cipher, Vigenere Cipher |
 | KASISKI Attack |
 | Cryptananalysis (several approaches) |
Class 5:
 | CIA Kryptos, and
MS Word
vulnerability
|
 | Coin tossing with hash functions and the Birthday Attack
vulnerability
|
 | Privacy-Integrity-Authentication-Non
Repudiation-Certification-Signatures
|
 | Identities, Message Authentication Codes, Challenge
response (symmetric and public keys) |
Class 6:
 | Key Strength |
 | Key Management |
 | Crypto protocols
|
 | Attacks against protocols
|
 | Merkles Puzzles |
Class 7:
 | Merkles Puzzles, cont. |
 | Diffie Helman Key exchange |
 | Hash functions |
Class 8:
 | Hash Functions
|
 | Large number -- properties
|
 | Random numbers
|
 | CSPRNG - how to? |
 | Authentication (shared secret) |
Class 9:
 | Symmetric Encryption Algorithms
|
 | Lucifer, DES, 3DES, IDEA, AES, Skipjack, Clipper |
 | Backdoor in Clipper |
Class 10:
 | Authentication - public keys
|
 | Messaging - public keys
|
 | Key Exchange - symmetric keys
|
 | Key Exchange - public Keys
|
 | Integrating authenticationa nd message integrity - public
and symmetric keys |
 | MITM attacks |
Class 11:
 | MITM Attacks |
 | Digital Signatures
|
 | Digital Certificates |
Class 12:
Class 13:
 | Project preliminaries (get a certificate from cacert.org or
trustcenter.de and verify the correctness of the certificate). |
 | How Certificate Authorities work |
 | SSL |
|
|
|