Students who did not take Introduction to Cryptography: Many of you have asked about taking this course without the prerequisite of Introduction to Cryptography.
| Topic | Lecture | Slides | Comments |
| Introduction | 30/10, 6/11 | ||
| Secure Code Design | 6/11, 13/11 | Bobby Tables | |
| Applied Cryptology | 13/11, 20/11 | The true story of Alice, Bob, and Eve | |
| Public Key Infrastructure | 27/11 | Don't Drink and Sign Certificates | |
| Entrance Control | 11/12, 18/12 | Password Reuse | |
| Network Threats | 18/12, 1/1 | Real Threats | |
| Firewalls | 1/1, 8/1 | ||
| IPsec | 8/1,15/1 | ||
| IKE | 15/1,22/1 | ||
| SSL | 22/1 | ||
| Wireless Security | 29/1 |
Slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
| Assignment | Due | Comments |
| Homework #1 | 5/12/2011, 14:00 | Regular mine sweeper boards Special mine sweeper boards |
| Homework #2 | 21/12/2011, 14:00 | Please note an update to Question 1(a). It is Cameron who signs certificates for Rutte, Putin, and Faymanni (not Tusk!) |
| Homework #3 | 11/1/2012, 14:00 | |
| Homework #4 | 25/1/2012, 14:00 | Firewall Table SAD Table SPD Table |
| Homework #5 | 1/2/2012, 14:00 |