Lecture Schedule
The syllabus below is tentative, and is subject to change
as the semester progresses. I will continually update it to reflect what
we have covered in class thus far.
You are responsible for all the material referenced below, even if it is not covered in class, unless it is explicitly marked 'optional'.
Security Basics and Course Overview
- [Jan 26: Lecture 1] Introduction, course
overview, and why security is harder than it looks
Slides for lecture 1
Additional reading:
Cryptography: Its Uses and Limitations
- [Jan 31: Lecture 2] Introduction to cryptography; private-key encryption
Slides for lecture 2
Additional reading:
- [Feb 2: Lecture 3] Private-key encryption, the one-time pad, computational security, pseudorandom generators
Slides for lecture 3
- [Feb 7: Lecture 4] Private-key encryption, randomized encryption
Slides for lecture 4
- [Feb 9: Lecture 5] Modes of encryption, message authentication
Slides for lecture 5
- [Feb 14: Lecture 6] Message authentication, hashing, authenticated encryption.
Diffie-Hellman key exchange, the public-key setting
Slides for lecture 6
- [Feb 16: Lecture 7] The public-key setting, public-key encryption
Slides for lecture 7
- [Feb 21: Lecture 8] Hybrid encryption, non-malleability and security against chosen-ciphertext attacks. Digital signatures
Slides for lecture 8
- [Feb 23: Lecture 9] Crypto pitfalls and case studies
Slides for lecture 9
Additional reading:
Required:
Optional (covered in, or related to, class; read only if interested):
- [Feb 28: Lecture 10] Crypto pitfalls, circumventing crypto, side-channel attacks
Slides for lecture 10
Additional reading:
Required:
Optional (covered in, or related to, class; read only if interested):
Network Security Principles
- [Mar 1: Lecture 11] Authentication overview. Biometric authentication
Slides for lecture 11
- [Mar 6: Lecture 12] Passwords and password-based authentication
Slides for lecture 12
Additional reading (optional):
- [Mar 8: Lecture 13] Symmetric- and public-key authentication. Mutual authentication and key exchange
Slides for lecture 13
- [Mar 13: Lecture 14] Authenticated key exchange.
Mediated authentication and key exchange. PKI and certification authorities
Slides for lecture 14
- [Mar 15: Lecture 15] *** Midterm Exam ***
- [Mar 27: Lecture 16] PKI and certification authorities.
Midterm exam review
Slides for lecture 16
System Security
Programming-Language Security
Privacy/Anonymity
- [Apr 26: Lecture 25] Database privacy.
Slides for lecture 25
Additional reading (optional):
- Database privacy:
- Privacy in social networks:
- Privacy on the web:
- Anonymous communication:
Network Security in Practice
- [May 1: Lecture 26] Network security protocols in practice. SSL.
Slides for lecture 26
- [May 3: Lecture 27] (Guest lecture by Jeff Stuckman.)
Control-flow integrity, taint tracking.
Slides for lecture 27
Additional reading (optional):
- [May 8: Lecture 28] IPsec and IKE. Intrusion detection.
Slides for lecture 28
Additional reading (optional):
- [May 10: Lecture 29] Final exam