Course website : profpartha.webs.com/cryptov4.htm
Course Instructor : Prof. S. Parthasarathy (email@example.com)
Each session = 90 min. approx
|32,33||2014-01-08||Closure. Debriefing. Exam announcement and instructions. Course feedback and speakout. Salute the giants.|
Videos: 1. Alan Turing 2. Claude Shannon
|30, 31||2014-01-03||Misc. concepts and tools: Leet, one-way encryption, steganography, Hamming, Chaffing and winnowing, secure wipe/shred, ethical hacking, practice what you preach.|
|28, 29||2014-01-02||SSL at work. Detailed overview of SSL. Downloading and importing CA root certificate, and CRL. CRL vs OCSP. |
1. The web is down
3. How SSL works
|26, 27||2014-01-01||Network security tools. PKI. TCP/IP. IPV4 vs IPV6. IPSEC. Other tools.|
|24, 25||2013-12-27||Principles of Authentication, Identity authentication, content authentication, zero-knowledge authentication, challenge-response authentication, biometric authentication, passwords. Strong passwords. Demo of password meters.|
Video: What are smart cards ?
|22, 23||2013-12-26||Security enhanced Linux, Multi-level security, BIOS password, Bootloader password, Login password, secure coding tools, Discretionary access control,|
Mandatory access control,
Physical verification of GPG fingerprints of students keys.
|20, 21||2013-12-25||Number theory -- DL problem.|
Overview of RSA algorithm.
Mid course review. The Indian angle.
|18, 19||2013-12-20||Fundamental concepts in number theory, Peano's axioms, What are Numbers ?, Divisibility, quotient, remainder, modulo arithmetic, properties of modulo arithmetic, Fermat's little theorem, Euler's generalisation, modulo inverse, Prime numbers, co-primes, Euler's totient function, GCD, Euclidean algorithm, extended Euclidean algorithm.|
|16, 17||2013-12-16||Cryptographic standards. Block ciphers, Feistel structures. DES, 3DES, AES. ECB, CBC modes, S box, P box. Overview of Blowfish, IDEA. |
Video -- Key strength and brute force attacks. Exercise 5, 5a, 5b
|13, 14, 15||2013-12-13||GPG Command examples. Export keys. Import keys. Secure key distribution.|
Exercises : 4a, 4b, 4c -- importing keys securely
|12, 13||2013-12-09||GPG introduction. Command examples.|
Demo: Creating GPG key pairs.
|9, 10, 11||2013-12-06||Pig pen cipher, Block ciphers, Feistel networks. Hash digests, MAC and HMAC, principles of hash digests, properties of hash digests, md family vs. sha family, sha3, digital signatures, properties and usage, demos of md5sum and shasum, "How to build a fortress"|
Video: Diffie Helman key exchange -- paints analogy
Exercise #3: Subscribe Schneier's cryptogram newsletter.
|7, 8||2013-12-02||Symm. key crypto contd., ROT13, XOR, Vigenere cipher, trap-door functions, factoring problem, discrete logarithm problem. |
Video: Locked box analogy
Demo: Doing it with zip. Doing it with vi
Exercise #2: Symmetric encryption with zip.
|5, 6||2013-11-28||Elements of cryptography, terminology, encryption vs. decryption, Why Alice and Bob should go on a holiday, Caesar's cipher, symmetric keys, key exchange problem, concepts of asymmetric key cryptography, public key vs. private key. |
Videos: Ronald Rivest, Bruce Schneier.
|3,4||2013-11-27||e-security: risks, threats, remedies. Simple examples. |
Exercises #1a, #1b, #1c. Handout DVD distributed to the class.
|1, 2||2013-11-21||Start crypto-v4 course. Take off lecture. |
|0||2013-11-10 to 2013-11-20||Political disturbances. KU closed due to strikes.|