Security, lectures, Fall 2017
General information on this course can be found in the
studiegids.
Information about the exercises can be
found on a different page.
The first lecture will be on Thursday Sept. 7, 13:45, in
CC4. The exercise courses start one week later, on Sept. 15, at 13:45,
in HG00.303 and HG00.307.
Organisational aspects of the
course will be explained during the (first hour of the) first lecture.
Don't forget to register officially for this course, in
Osiris; blackboard will only be used for emails
announcements and marks.
For background information and further reading we refer to the book Everyday Cryptography by Keith Martin. A pdf is available in Blackboard. Another very good source of information is the book Security Engineering by Ross Anderson, that can be downloaded from the author's website.
Slides are being produced as the course proceeds:
Lectures |
Topic |
File |
1-3 | Introduction |
pdf |
3-7 | Symmetric crypto (final 19/10) |
pdf |
7-9 | Hashing |
pdf |
9-14 | Public key crypto (updated 21/12) |
pdf |
15 | Applications |
pdf |
- Lecture 1, 7/9: General introduction, until slide 27.
Homework:
read Usability
and Psychology, and watch the TED videos of
Bruce Schneier
and Avi Rubin.
- Lecture 2, 14/9: General introduction, until slide 39.
- Lecture 3, 21/9: General introduction finished; Symmetric
crypto part started, until slide 21 (but with some slides skipped,
temporarily).
- Lecture 4, 28/9: Symmetric crypto part continued,
especially block ciphers and one-time-pad, until slide 37.
- Lecture 5, 5/10: Symmetric crypto part continued,
end of stream ciphers and security protocols, until slide 61.
- Lecture 6, 12/10: Symmetric crypto part continued,
attacks on security protocols, block cipher modes of use, symmetric key management, until slide 88.
- Lecture 7, 19/10: Symmetric crypto part finalized: symmetric key management and e-passports, until end. Hashing part started, definition and coin-tossing protocol, until slide 18. For hashing with SHAKE128 in Python: CompactFIPS202.py and SHAKE.py
- Lecture 8, 26/10: Hashing continued, applications, expected properties and standards, until slide 48.
- Lecture 9, 16/11: Hashing part finalized. Public key crypto part started: problems in key management, public key crypto, math basics for public-key crypto until slide 32.
- Lecture 10, 23/11: Public key crypto continued, math basics for public-key crypto and start of RSA until slide 50.
- Lecture 11, 30/11: Public key crypto continued, RSA and public key authentication until slide 70.
- Lecture 12, 7/12: Public key crypto continued, public key authentication until slide 84 and Simon Singh documentary "going public".
- Lecture 13, 14/12: Public key crypto continued, skipped Diginotar case and electronic signatures, started discrete-log based cryptography, slides 104 - 121.
- Lecture 14, 21/12: DigiNotar case, and part of practical
signatures, slides 88 - 96.
- Lecture 15, 11/1: Overview of public key crypto, with
digital signatures, including blind ones. Asymettric slide set
finished.
- Lecture 15, 18/1: Bitcoins, and exam preparation, see
the applied slide set.