CNT5412 - Network Security - Spring 2025 - Schedule | ||||
Date | Topic | Resources | Homework | |
Week 1 | 01/06 | Logistics. Introduction: HTTPs and TLS, TLS cookie-cutter attack, DoS, IPSec | Logistics Slide 0 | |
01/08 | Introduction, continued: Tor. Network attacks: TCP SYN Flood, TCP Reset Attack | Slide 1 | ||
01/10 | Network attacks, continued: TCP Hijacking, Reverse Shell, DNS Poisoning. | Slide 1 | Lab 1 | |
Week 2 | 01/13 | Intro to crypto: classical ciphers, perfect secrecy and one-time pad. | Slide 2 | |
01/15 | Review of probability theory | Scribe 2 | ||
01/17 | Discussion of Lab 1 | Lab 1 due | ||
Week 3 | 01/20 | Martin Luther King Day | ||
01/22 | Campus closed | |||
01/24 | Campus closed | Lab 2 | ||
Week 4 | 01/27 | Review of probability theory, continued. | Scribe 2 | |
01/29 | Blockcipher: PRF, examples of PRF attacks, birthday attack. | Slide 3 | ||
01/31 | Blockcipher, continued: Applications of PRF in TCP, One-time password | Slide 3 | Lab 2 due | |
Week 5 | 02/03 | Blocipher, continued: Challenge-response protocol. Encryption: Syntax, ECB, CBC, CTR. | Slide 4 | Lab 3 |
02/05 | Encryption, continued: Security notions (left-or-right, real-or-random). Practice: breaking CBC encryption in SSH. | Slide 4 | ||
02/07 | MAC: syntax, security definition, replay attack. CBC-MAC and extension attack | Slide 5 | ||
Week 6 | 02/10 | MAC, continued: insecure variants of CBC-MAC, Encrypted CBC-MAC. MAC and PRF, Carter-Wegman paradigm. | Slide 5 | Lab 3 due |
02/12 | MAC, continued: attacks on secure variants of CBC-MAC. Authenticated encryption: motivation, syntax, attacks on CBC and its variants. | Slide 5 Slide 6 | Hw1 | |
02/14 | Review: practice attacks on encryption and MAC. Authenticated encryption, continued: breaking insecure variants of CBC, WEP cosntruction. | Slide 6 | ||
Week 7 | 02/17 | Authenticated encryption, continued: ChopChop attack on WEP, generic composition | Slide 6 | |
02/19 | Authenticated encryption, continued: generic composition, exercises on simple padding-oracle attacks | Slide 6 | ||
02/21 | Authenticated encryption, continued: exercises on simple padding-oracle attacks | |||
Week 8 | 02/24 | Authenticated encryption, continued: padding oracle attack on TLS | Slide 6 | Hw1 due |
02/26 | Hash function: security definition (collision resistance and random-oracle model), Merkle-Damgard, Length Extension attack, truncated MD and HMAC. Application: password hashing | Slide 8 | Lab 4 | |
02/28 | Encryption in protocols: nonce-based AE with associated data, SSH and boundary hiding, streaming encryption | Slide 7 | ||
Week 9 | 03/03 | Encryption in protocols, continued: Attack on Tor | Slide 7 | |
03/05 | Review of padding oracle attack for Lab 4. | |||
03/07 | No class; Tung's out of town | |||
Week 10 | 03/10 | Springbreak | ||
03/12 | Springbreak | |||
03/14 | Springbreak | |||
Week 11 | 03/17 | Review of Hw1. Intro to asymmetric crypto. | Slide 9 | |
03/19 | Asymmetric crypto, coninued: Diffie-Hellman key exchange, number theory basics, Diffie-Hellman assumptions. | Slide 9 | Lab 4 due | |
03/21 | Public-key encryption: definition, Plain RSA and attacks, Hashed RSA | Slide 10 | Hw2 | |
Week 12 | 03/24 | Public-key encryption, continued: PKCS#1 encryption and padding-oracle attack, OAEP, authenticated key exchange | Slide 10 | |
03/26 | Digital signature: RSA signature and attacks | Slide 11 | ||
03/28 | Digital signature, continued: Full-domain Hash, DNSSEC. Review of Hw1 | Slide 11 | ||
Week 13 | 03/31 | Public-key infrastructure: CA and certificate. Guideline for Hw3 | Slide 12 | Hw2 due Hw3 |
04/02 | Review of Hw2. Public-key infrastructure, continued. | Slide 12 | ||
04/04 | Office hours | |||
Week 14 | 04/07 | Office hours | ||
04/09 | Office hours | |||
04/11 | Office hours | Hw3 due | ||
Week 15 | 04/14 | Office hours | ||
04/16 | Office hours | |||
04/18 | Office hours | |||
Week 16 | 04/21 | Office hours | ||
04/23 | Office hours | |||
04/25 | Office hours |