Security, lectures, Fall 2011
General information on this course can be found in the
studiegids.
Information about the exercises can be
found on a different page.
The first lecture will be on Sept. 5, 8:45, in
HG00.304.
Thus, this course will start in week 36 (and not in week
35, the official first week of lectures). To catch up, in week 36 two
lectures will be given, namely on both monday and thursday morning, at
8:45-10:30, in lecture hall HG00.304. Subsequently, lectures will be
given on monday mornings, and exercise courses on thursday
mornings.
Don't forget to register officially for this course.
Slides are being produced as the course proceeds:
| Lectures |
Topic |
File |
| 1-2 | Introduction |
pdf |
| 3-6 | Symmetric crypto |
pdf |
7-8 | Hashes |
pdf |
9-12 | Asymmetric crypto |
pdf |
13-15 | Applications |
pdf |
- Lecture 1, 5/9: general introduction, up to page 21 of the
introductory slides.
- Lecture 2, 8/9: continued introduction, up to page 29 of the
introductory slides.
- Lecture 3, 12/9: introduction finished, start of
symmetric crypto, up to page 16.
- Lecture 3, 19/9: transposition and one-time pads,
symmetric crypto for confidentiality and integrity, up to page 40.
- Lecture 5, 26/9: symmetric crypto for authentication;
various protocols and attacks, up to page 51.
- Lecture 6, 3/10: e-passport (with two attacks) and
modes of encryption, until the end of the slides on symmetric
crypto.
- Lecture 7, 10/10: hash basics and applications
- Lecture 8, 17/10: hash applications in voting and
road pricing
- Lecture 9, 7/11: basics of public key crypto and RSA,
up to slide 30.
- Lecture 10, 14/11: usage of public key crypto, in Java and
in elementary protocols (esp. signing for non-repudiation), up to
slide 52.
- Lecture 11, 21/11 (by Flavio Garcia): PKI infrastructure,
up to slide 67 (plus Simon Singh documentary)
- Lecture 12, 28/11: PKI vulnerabilities (including DigiNotar)
and discrete-log based algorithms (Diffie-Hellman and El Gamal).
This completes the slides on asymmetric crypto.
- Lecture 13, 5/12: Identity managment, esp. biometrics
- Lecture 14, 12/12: Identity mangament, continued,
including Kerberos \& DigiD
- Lecture 15, 19/12 (by Pim Vullers):
- Bonus lecture 16, 9/1/12 on cyber security.