| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Class Organizations General Introduction |
General Introduction | Chapter 1 |
Syllabus ( PDF Format) |
||
| Thursday |
Classic ciphers Stream ciphers |
Classic ciphers
Stream ciphers |
Chapter 2, 3.2 6.3 (Not required for exams) |
H: homework #1 (Word Doc Format) (Due 9/11/2012) |
| Date | Topics | Lecture Notes | Reading | Handout | Papers/Examples | Assignments |
|---|---|---|---|---|---|---|
| Wednesday | Stream ciphers (continued) Block ciphers |
Block ciphers | 3.3.1, 6.4.4, 6.4.5 (not required for exams), 6.4.6 (not required for exams), 6.4.7 |
"Breaking WEP Under 60 Seconds"
(not required for exams) TDES |
||
| Thursday | Block ciphers (continued) |
3.3.2 - 3.3.7, 3.4, 3.5 | H: homework #2 (Word Doc Format) (Due 9/18/2011) P: Term Project Guideline (Word Doc Format) (Brief proposal due: 11/15/2012; final report due: 5:00pm, 12/14/2012) |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Block ciphers (continued) |
Same as last time | ||||
| Thursday | Public Key Crypto | Public Key Crypto | 4.1-4.4 6.5 (not required for exams) 6.6 |
H: homework #3 (Word Doc Format) (Due 10/2/2012) rec2.ps rauth2.ps |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Public Key Crypto (Continued) |
4.5-4.8 | ||||
| Thursday | Hash Functions | Hash Functions | 5.1-5.6 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Hash Functions (Continued) Local Authentication |
Local Authentication | 5.7-5.9 7.1-7.3 |
|||
| Thursday | Authentication (Continued) |
7.4-7.7 | H: homework #4 (Word Doc Format) (Due 10/9/2012) |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Authorization | Authorization Part I | 8.1-8.4 | |||
| Thursday | Authorization (Continued) Insider Threat (not required for exams) |
Insider Threat | 8.5-8.7 | H: homework #5 (Word Doc Format) (Due 10/18/2012) |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Simple Authentication Protocols | Simple Authentication | 9.1-9.3 | |||
| Thursday | Simple Authentication Protocols (Continued) |
(Same as last time) | 9.3-9.5 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Midterm Exam Review | Midterm Exam Review | ||||
| Thursday | Midterm Exam Review (Continued if needed) Real-world Security Protocols |
Real-World Security |
10.1-10.3 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday |
Real-World Security Protocols (Continued) |
10.4-10.5 | ||||
| Thursday |
Questions and answers Real-World Security Protocols (Continued) |
10.6-10.8 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday (Oct. 30) |
Midterm Exam | |||||
| Thursday | Real-World Security Protocols (Continued) |
10.6-10.8 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Real-World Security Protocols (Continued) |
H: homework #6 (Word Doc Format) (Due 11/20/2012) homework #8 (Word Doc Format) (Due 12/4/2012) |
||||
| Thursday | Real-World Security Protocols (Continued) |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Software Flaws and Malware | Software Flaws and Malware | 11.1-11.3, 11.5 | H: homework #7 (Word Doc Format) (Due 11/29/2012) |
||
| Thursday | Software Flaws and Malware (Continued) SRE and DRM |
SRE and DRM | 11.3-11.6 12.2-12.3 |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | SRE and DRM (Continued) Secure Software Development |
Secure Software Development | 12.4 | |||
| Thursday | Thanksgiving | No class |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Operating System Security | Operating System Security SELinux and Windows Case Studies Android Security |
Chapter 13 | |||
| Thursday | Review for the final exam | Review for Final Exam |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Tuesday | Review for the final exam (Continued) Questions and answers Case studies of real world security vulnerabilities |
Stuxnet | ||||
| Thursday |
DDOS and Defenses Advanced Topics and Summary (Information Flow, Tempest, and So on) (Not on the final exam) |
DDOS Tempest HiStar Dhaval Presentation on Certifications |
| Date | Topics | Lecture Notes | Reading | Handout | Papers | Assignments |
|---|---|---|---|---|---|---|
| Thursday | December 13, 3:00 - 5:00PM | Final Exam (Cumulative) |