-
Notifications
You must be signed in to change notification settings - Fork 41
Fall 2017 Syllabus
matthewdgreen edited this page Nov 29, 2017
·
10 revisions
Dates are subject to radical & arbitrary change. Reading assignments are due prior to beginning of the subsequent class.
- Jonathan Katz, Yehuda Lindell: Modern Cryptography
- Ross Anderson: Security Engineering (PDFs available online)
- Optional Reference: Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography (PDFs available online)
- Note: Special Thursday class!
- Assignment 1 handed out (via Blackboard)
- Reading: Anderson (Security Engineering), Chapter entitled �Cryptography�: Sections on �Symmetric Crypto Primitives� (5.4 in online version)
- Reading (supplementary, optional): Handbook of Applied Cryptography, chapter entitled "Block Ciphers".
- Reading: Anderson (Security Engineering), Chapter entitled �Cryptography�: �Asymmetric Crypto Primitives� (5.7 in online version).
- Reading (supplementary, optional): Handbook of Applied Cryptography, chapter entitled "Public Key Encryption".
- Assignment 1 is due tomorrow (Tuesday 9/19, 11:59pm)!
- Assignment 2 handed out (via Blackboard)
- Reading: Schneier, Wagner: Analysis of the SSL 3.0 Protocol
- [Imperfect Forward Secrecy https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf]
- Reading: Borisov, Goldberg, Brewer [Off-the-Record Communication https://otr.cypherpunks.ca/otr-wpes.pdf]
- Assignment 2 is due tomorrow (Tuesday 10/3, 11:59pm!)
- Assignment 3 handed out (via Blackboard)
- Reading: Kocher, Timing attack on RSA & DL systems
- Reading: Anderson, Physical Tamper Resistance
- Bernstein: Cache timing attacks on AES
- Reading: Gutmann, Lessons Learned in Implementing and Deploying Crypto Software
- Reading: Adam Langley, GotoFail
- Assignment 1 is due by 11:59pm today, Monday 9/19
- Reading: Bardou et al., Efficient Padding Oracle Attacks on Cryptographic Hardware
- Reading (optional): Remote Timing Attacks are Practical](https://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf)
- Reading: Checkoway et al. A systematic analysis of the Juniper Dual EC incident
- Reading: Schneier, Wagner: Analysis of the SSL 3.0 Protocol
- Biondi, Desclaux: Silver Needle in the Skype (2006, REing of Skype binary)
- Reading: Kohno: Breaking and Repairing SSH
- Assignment 3 is due