Students who did not take Introduction to Cryptography: Many of you have asked about taking this course without the prerequisite of Introduction to Cryptography.
Topic | Lecture | Slides | Comments |
Introduction | 30/10, 6/11 | ||
Secure Code Design | 6/11, 13/11 | Bobby Tables | |
Applied Cryptology | 13/11, 20/11 | The true story of Alice, Bob, and Eve | |
Public Key Infrastructure | 27/11 | Don't Drink and Sign Certificates | |
Entrance Control | 11/12, 18/12 | Password Reuse | |
Network Threats | 18/12, 1/1 | Real Threats | |
Firewalls | 1/1, 8/1 | ||
IPsec | 8/1,15/1 | ||
IKE | 15/1,22/1 | ||
SSL | 22/1 | ||
Wireless Security | 29/1 |
Slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
Assignment | Due | Comments |
Homework #1 | 5/12/2011, 14:00 | Regular mine sweeper boards Special mine sweeper boards |
Homework #2 | 21/12/2011, 14:00 | Please note an update to Question 1(a). It is Cameron who signs certificates for Rutte, Putin, and Faymanni (not Tusk!) |
Homework #3 | 11/1/2012, 14:00 | |
Homework #4 | 25/1/2012, 14:00 | Firewall Table SAD Table SPD Table |
Homework #5 | 1/2/2012, 14:00 |