CSE539: Applied Cryptography

Information Assurance          Computer Science and Eng.         Fulton School of Eng.

   
 

Home Description Text Book Lecture Notes Course Instances Announcements Projects Assignments Resource Links Contact

 

Resource Links for Cryptography

Specific links for Cryptography
bullet Lecture Notes on Cryptography
bullet Handbook of Cryptography
bullet Cryptography FAQ
bulletThe Ken Thompson Lecture
bullet An Illustrated Guide to Cryptographic Hashes
bullet How SSL Works
bullet Java Classes from Bouncy Castle (for Crypto functions)
bullet The official DES Standard document.
bullet Good Papers from Rivest 
bullet Breaking DES
bullet Merkle's Puzzles.
bullet RSA Proof in MSWord
bullet RSA Proof in HTML/IE 

 

National, Governmental and Military Information Assurance

bullet National Information Assurance Policy for Space Systems http://www.nstissc.gov/Assets/pdf/nstissp_12.pdf
bullet Information Assurance Policy, State of Maryland http://www.dhmh.state.md.us/policies/summary.htm
bulletUS Government and Military Information Assurance Policy and Guidance http://iase.disa.mil/policy.html
bullet Security Supporting Policy and Functions http://www.acsac.org/secshelf/book001/13.pdf
bullet Information Security Policy http://www.acsac.org/secshelf/book001/07.pdf
bulletDoD Policies http://www.c3i.osd.mil/org/sio/ia/diap/infomemo.html
bulletDoD Information Technology Security Certification and Accreditation Process  http://iase.disa.mil/ditscap/index.html 
bullet Vulnerability Analysis: SecurityTracker http://www.securitytracker.com/

 

Information Security Evaluation 

bullet National Information Assurance Training and Education Consortium (NIATEC) Site:  http://www.niatec.info/
bullet Evaluation Criteria for Trusted Systems, http://www.acsac.org/secshelf/book001/06.pdf
bullet Formal Models and Methods http://www.acsac.org/secshelf/book001/08.pdf
bullet Rule-set Modeling of a trusted system http://www.acsac.org/secshelf/book001/09.pdf
bullet Evaluation Issues http://www.acsac.org/secshelf/book001/12.pdf
bullet Penetration Testing http://www.acsac.org/secshelf/book001/11.pdf
bullet Information Assurance Advisory Council at UK (a lot of white paper and conference papers) http://www.iaac.org.uk/News/conferences.htm, http://www.iaac.org.uk/Publications/bps.htm

Digital Labaries

bullet ACM: The Association for Computing Machinery (800-342-6626, 212-626-0500)
bullet Digital Library
bullet Conferences
bullet IEEE: The Institute of Electrical and Electronics Engineers (800-678-4333, 732-981-0060)
bullet Digital Library (IEEE Xplore)
bullet Conferences
bullet IEEE Circuits and Systems Society :: Digital Library (OPeRA) :: Conferences
bullet IEEE Communications Society :: Digital Library :: Conferences
bullet IEEE Computer Society :: Digital Library :: Conferences
bullet SIAM: Society for Industrial and Applied Mathematics (215-382-9800)
bullet Digital Library
bullet Conferences
bullet IEEE Conference Forms (needed when running a conference)
bullet CRA: The Computing Research Association
bullet IACR

 

Standard

bullet Common Criteria for Information Technology Security Evaluation by ISO, 2000
bullet Network Security Essentials: Applications and Standards,  by  Williams Stallings, Prentice Hall
bullet NIST's Dictionary of Algorithms and Data Structures

 

Ethics
Papers discussing ethical principles applied to the use of computers and communications technology:
http://www2.norwich.edu/mkabay/ethics/index.htm

 

Cybercrime

bullet

http://www.govspot.com/spotlight/cybercrime.htm

bullet

http://www.wired.com/news/politics/0,1283,36566,00.html

 

Other resources

bullet

PGP package

bullet

AES survey