CNT4406 - Network Security - Spring 2024 - Schedule |
| Date | Topic | Resources | Homework |
Week 1 | 1/9 | University closed. | |
|
| 1/11 | Introduction: Logistics, Issues on Network security. | Logistics Slide 0 | |
Week 2 | 1/16 | Probabilistic analysis | Scribe 1 | |
| 1/18 | Exercise 1. Classical crypto, perfect security, one-time pad. | Slide 1 | |
Week 3 | 1/23 | Exercise 2. Blockcipher, PRF security, examples of bad blockciphers. | Slide 2 | |
| 1/25 | Blockcipher apps: TCP sequence, One-time password, Challenge-response | Slide 2 | Hw1 released |
Week 4 | 1/30 | Quiz 1. Symmetric encryption: ECB, CBC, CTR. | Slide 3 | |
| 2/1 | Symmetric encryption, continued: real-or-random and left-and-right. Breaking SSH encryption. | Slide 3 | |
Week 5 | 2/6 | Exercise 3. Review of Quiz 1. | | |
| 2/8 | MAC: definition, replay attack, CBC-MAC and its attacks, Encrypted CBC-MAC, Carter Wegman. | Slide 4 | Hw1 due (2/10) |
Week 6 | 2/13 | Quiz 2. Review of Hw1. | | Hw2 released |
| 2/15 | Authenticated encryption: motivation, definitions, encrypt-with-redundancy and their bugs, Chop-Chop attack | Slide 5 | |
Week 7 | 2/20 | Authenticated encryption: exercise | |
|
| 2/22 | Authenticated encryption: padding-oracle attack | Slide 5 Scribe 2 | |
Week 8 | 2/27 | Authenticated encryption: padding-oracle attack, continued | Slide 5 Scribe 2 | Hw2 due (3/2) |
| 2/29 | Quiz 3. |
| |
Week 9 | 3/5 | Review of Quiz 3. Feedback from Hw1 grading. Hash function: motivating examples, collision resistance, random-oracle model | Slide 7 | Hw3 released |
| 3/7 | Hash function, continued: Merkle-Damgard structure, extension attack, HMAC, password hashing. Exercise 4. | Slide 7 | |
Week 10 | 3/12 | Spring break | | |
| 3/14 | Spring break | | |
Week 11 | 3/19 | Encryption in protocols: Nonce-based AE, attack on SSH encryption, streaming encryption, attack on Tor encryption.
| Slide 6 | |
| 3/21 | Review of Hw2. | | |
Week 12 | 3/26 | Quiz 4. | | |
| 3/28 | Review
of Quiz 4. Asymmetric crypto: Diffie-Hellman key exchange, cyclic
group, primitive root, Diffie-Hellman assumption. Public-key
encryption: syntax, usage examples, hybrid encryption. | Slide 8, Slide 9 |
|
Week 13 | 4/2 | Exercise 5.
Public-key encryption, continued: RSA encryption, trapdoor permutation,
Hashed RSA | Slide 9 | Hw3 due |
| 4/4 | Padding-oracle attack on PKCS#1, CCA security and
OAEP, Authenticated key exchange. | | Hw4 released |
Week 14 | 4/9 | No class (Tung's out of town). | | |
| 4/11 | Review
of Hw3. | | |
Week 15 | 4/16 | Quiz 5. | | |
| 4/18 | | | |
Week 16 | 4/23 | Office hours | | |
| 4/25 | Office hours | | Hw4 due |