http://www.freewebs.com/profpartha/cryptoKUv3.htm
Each ession = 90 minutes
Class # | Date | Highlights |
---|---|---|
19, 20 | 2013-06-21 | Closure and Debriefing session. Misc. security techniques :: steganography, hamming, chaffing, winnowing, shred. Exam details announced. Videos on : Alan Turing, Claude Shannon. |
18 | 2013-06-20 | Network security tools : SSH SSL Explained |
16, 17 | 2013-06-11 | Authentication. Testing password strength. Network security Tools. IPV6, IPSEC, PEM. S/MIME, SET, SSL/TLS. |
15a | 2013-06-12 | Linux overview. Twin boot concept. Installing Linux/Ubuntu demo. Distributed copies of BOSS Linux. |
15 | 2013-06-09 | Authentication principles. Two factor authentication. Biometric authentication. Passwords. |
13, 14 | 2013-06-07 | Elementary number theory. Modular arithmetic. Fermat's little theorem, Euler's theorem. Factoring problem. Inverse Logarithm problem. Prime numbers. GCD. Euclidean algorithm and extended Euclidean algorithm.
Overview of RSA algorithm |
12 | 2013-06-06 | Overview of some cryptographic standards. Feistel networks. DES, 3DES, IDEA. S box. P box. |
11 | 2013-06-02 | Hash digests. Essential properties. md family vs sha family. Merkle Damgard construction. Role of digests in digital signatures. sha3 competition and result. How to build a fortress with hash digest and digital signature. |
09, 10 | 2013-05-31 | PGP/GPG. Encrytion, decryption, signing, verfification with GPG. Keys and key management using Command Line. KGPG interface, Thunderbird interface. |
08 | 2103-05-30 | Security issues in operating systems. Linux security features. Introduction to PGP/GPG |
07 | 2013-05-26 | Security issues in operating systems. Linux security features. SE Linux. |
05, 06 | 2013-05-24 | Asymm. Key Cryptography. Intro: AKC, PKI, PKC, X509. Viginere Cipher, Feistel cipher, Pigpen cipher. Stream cipher vs block cipher. Encryption, signing. Videos: DH key exchange, suitcase analogy. |
04 | 2013-05-23 | Symm. Key Cryptography. Demo using zip, vi. Videos -- Ron Rivest, Bruce Schneier. Distributed copies of course DVD |
03 | 2013-05-19 | CE students (56) join the class. Cryptography fundamental principles. |
02 | 2013-05-16 | E-security overview. Threats, remedies. |
01 | 2013-05-15 | CS students = 19. Take-off lecture. Course overview. |