CNT5412 - Network Security - Spring 2025 - Schedule

DateTopicResourcesHomework
Week 101/06Logistics. Introduction: HTTPs and TLS, TLS cookie-cutter attack, DoS, IPSecLogistics    Slide 0   
01/08Introduction, continued: Tor. Network attacks: TCP SYN Flood, TCP Reset Attack Slide 1
    01/10 Network attacks, continued: TCP Hijacking, Reverse Shell, DNS Poisoning. Slide 1Lab 1
Week 201/13Intro to crypto: classical ciphers, perfect secrecy and one-time pad. Slide 2
01/15Review of probability theoryScribe 2
    01/17Discussion of Lab 1
Lab 1 due
Week 301/20Martin Luther King Day
01/22Campus closed
    01/24Campus closedLab 2
Week 401/27Review of probability theory, continued. Scribe 2
01/29Blockcipher: PRF, examples of PRF attacks, birthday attack. Slide 3
    01/31Blockcipher, continued: Applications of PRF in TCP, One-time passwordSlide 3Lab 2 due
Week 502/03Blocipher, continued: Challenge-response protocol. Encryption: Syntax, ECB, CBC, CTR. Slide 4Lab 3
02/05Encryption, continued: Security notions (left-or-right, real-or-random). Practice: breaking CBC encryption in SSH.  Slide 4
    02/07MAC: syntax, security definition, replay attack. CBC-MAC and extension attackSlide 5
Week 602/10MAC, continued: insecure variants of CBC-MAC, Encrypted CBC-MAC. MAC and PRF, Carter-Wegman paradigm. Slide 5Lab 3 due
02/12MAC, continued: attacks on secure variants of CBC-MAC. Authenticated encryption: motivation, syntax, attacks on CBC and its variants.Slide 5
Slide 6
Hw1
    02/14Review: practice attacks on encryption and MAC. Authenticated encryption, continued: breaking insecure variants of CBC, WEP cosntruction. Slide 6
Week 702/17Authenticated encryption, continued: ChopChop attack on WEP, generic composition Slide 6
02/19Authenticated encryption, continued: generic composition, exercises on simple padding-oracle attacksSlide 6
    02/21Authenticated encryption, continued: exercises on simple padding-oracle attacks
Week 802/24Authenticated encryption, continued: padding oracle attack on TLSSlide 6Hw1 due
02/26Hash function: security definition (collision resistance and random-oracle model), Merkle-Damgard, Length Extension attack, truncated MD and HMAC. Application: password hashingSlide 8Lab 4
    02/28Encryption in protocols: nonce-based AE with associated data, SSH and boundary hiding, streaming encryptionSlide 7
Week 903/03Encryption in protocols, continued: Attack on TorSlide 7
03/05Review of padding oracle attack for Lab 4. 
    03/07No class; Tung's out of town
Week 1003/10Springbreak
03/12Springbreak
    03/14Springbreak
Week 1103/17Review of Hw1. Intro to asymmetric crypto. Slide 9 
03/19 Asymmetric crypto, coninued: Diffie-Hellman key exchange, number theory basics, Diffie-Hellman assumptions. Slide 9Lab 4 due
    03/21 Public-key encryption: definition, Plain RSA and attacks, Hashed RSASlide 10Hw2
Week 1203/24 Public-key encryption, continued: PKCS#1 encryption and padding-oracle attack, OAEP, authenticated key exchangeSlide 10
03/26 Digital signature: RSA signature and attacksSlide 11 
      03/28 Digital signature, continued: Full-domain Hash, DNSSEC. Review of Hw1Slide 11
Week 1303/31 Public-key infrastructure: CA and certificate. Guideline for Hw3 Slide 12Hw2 due Hw3
04/02Review of Hw2. Public-key infrastructure, continued. Slide 12
    04/04Office hours
Week 1404/07Office hours
04/09Office hours
    04/11Office hoursHw3 due
Week 1504/14Office hours
04/16Office hours
      04/18Office hours
  Week 16   04/21Office hours
   04/23Office hours
   04/25Office hours