Security, lectures, Fall 2016
General information on this course can be found in the
studiegids.
Information about the exercises can be
found on a different page.
The first lecture will be on Thursday Sept. 1, 10:45, in
LIN3. The exercise courses start one week later, on Sept. 9, at 13:45,
in LIN4 and LIN5.
Don't forget to register officially for this course, in
Osiris; blackboard will only be used for emails
announcements and marks.
Slides are being produced as the course proceeds:
Lectures |
Topic |
File |
1-2 | Introduction |
pdf |
3-6 | Symmetric crypto (updated 6/10) |
pdf |
7-8 | Hashing (final version, uploaded 10/11) |
pdf |
9-14 | Public key crypto (updated 8/12) |
pdf |
12-15 | Applications |
pdf |
- Lecture 1, 1/9: General introduction, until slide 30.
Homework:
read Usability
and Psychology, and watch the TED videos of
Bruce Schneier
and Avi Rubin.
- Lecture 2, 8/9: intro continued, until slide 48.
- Lecture 3, 15/9: intro finished; start of symmetric
crypto, with substitution and transposition ciphers, until slide 25.
- Lecture 4, 22/9: symmetric crypto techniques discussed,
and also use of symmetric crypto for confidentiality, until slide 42.
- Lecture 5, 29/9: symmetric crypto for authentication, until slide 50.
- Lecture 6, 6/10: attacks on symmetric authentication protocols, modes for encryption and authentication and beginning of e-Passport example, until slide 70 (alert: slides have been updated starting from slide 57).
- Lecture 7, 13/10: end of e-Passport example, start of hashing, until slide 27. For hashing with SHAKE128 in Python: CompactFIPS202.py and SHAKE.py
- Lecture 8, 20/10: hashing, until slide 48.
- Lecture 9, 10/11: finalized hashing, public key crypto until beginning of RSA, slide 23.
- Lecture 10, 17/11: basic math for public key crypto until slide 38. The excel sheets used during the course: PKMath.xlsx.
- Lecture 11, 24/11: finalized basic math for public key crypto, RSA until slide 61 (slides 55 and 56 still to do).
- Lecture 12, 1/12: finalized RSA, rolling out public key crypto until slide 79. Homework: read Letter of Bruce Schneier on IoT security to congress and watch Zembla: hacking for dummies
- Lecture 13, 8/12: rolling out public key crypto: finished but skipped slides 83-90, discrete-log based crypto until slide 112.
- Lecture 14, 15/12: ElGamal encryption and signatures,
public key protocols, until slide 134.
- Lecture 15, 22/12: Public key crypto topic finished, and
Diginotar case explained.
- Lecture 16, 12/1: Bitcoin explained; authentication is
skipped from this set of slides. Exam preparation (see end of slides)
discussed.