Lecture |
Date |
Summary and Reading |
Security Basics and Course Overview |
1 |
Jan 29 |
Introduction, course overview, and why security is harder than it looks
|
Cryptography: Its Uses and Limitations |
2 |
Jan 31 |
Introduction to cryptography
|
3 |
Feb 5 |
JCA; Private-key encryption basics
|
4 |
Feb 7 |
Private-key encryption, message authentication
|
5 |
Feb 12 |
Message authentication, hashing, Diffie-Hellman key exchange
|
6 |
Feb 14 |
The public-key setting; public-key encryption
|
7 |
Feb 19 |
Digital signatures. Crypto pitfalls
The following articles are completely optional, and are intended for those who enjoy this sort of material
|
8 |
Feb 21 |
Crypto pitfalls
The following articles are completely optional, and are intended for those who enjoy this sort of material
|
System Security |
9 |
Feb 26 |
General principles, access control
|
10 |
Feb 28 |
Access control
|
11 |
Mar 4 |
Midterm review. Access control
|
*** |
Mar 6 |
Midterm exam
|
12 |
Mar 11 |
Exam review. Access control, trusted computing
|
Network Security |
13 |
Mar 13 |
Memory protection. Network security/authentication
|
14 |
Mar 25 |
Authentication techniques
|
15 |
Mar 27 |
Authentication techniques
|
16 |
Apr 1 |
Authentication and key exchange
|
17 |
Apr 3 |
Authentication and key exchange; mediated key exchange; cookie authentication
|
18 |
Apr 8 |
PKI and certification authorities
|
19 |
Apr 10 |
Revocation. Deniability
|
20 |
Apr 15 |
Zero-knowledge and deniability. Anonymity
|
21 |
Apr 17 |
Anonymity
The following are optional:
|
*** |
Apr 22 |
Midterm exam
|
Database Security |
22 |
Apr 24 |
Database security
The following is optional
|
Programming-Language and Application-Level Security |
23 |
Apr 29 |
Database security. PL security, buffer overflows
The following are optional:
|
24 |
May 1 |
Buffer overflows and XSS attacks, and defenses (guest lecture by Prof. Mike Hicks)
|
Network Security in Practice |
25 |
May 6 |
Finish up PL security. Intrusion detection and firewalls
|
26 |
May 8 |
Network secuity issues. IPSec
- Slides for lecture 26
- KPS, Chapter 16; Sections 17.1, 17.2.2, 17.3.1, 17.3.2, 17.5
- For more details about network layers, see any book on computer networking; e.g., Section 1.3 of "Computer Networks, a Systems Approach (3rd edition)," by Peterson and Davie. See aso here
|
27 |
May 13 |
IKE, SSL
|
*** |
May 19 |
Final exam, 10:30-12, CSIC 1122
|