This shows you the differences between two versions of the page.
courses:is2011:main [2011/10/12 20:17] tsay |
courses:is2011:main [2022/12/09 11:10] (current) tsay2 [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
+ | * Feb. 04: Grade Report available. | ||
+ | * Dec. 27: class will meet in front of 台大計中 at 1:30PM on Jan. 3, 2012. | ||
+ | * Dec. 13: project descriptions: {{courses:is2011:termproject_tsay.pdf|Prof. Tsay}}, {{courses:is2011:termproject_lin.pdf|Prof. Lin}}, {{courses:is2011:termproject_lee.pdf|Prof. Lee}}, and [[courses:is2011:termproject_sun|Prof. Sun]]. | ||
+ | * Dec. 13: {{courses:is2011:termproject.pdf|Term Project}} announced; proposal due on Dec. 27. | ||
+ | * Nov. 02: {{courses:is2011:hw2.doc|HW#2}} due on Nov. 15. | ||
+ | * Nov. 01: suggested solutions for {{courses:is2011:hw1a_s.pdf|HW#1A}} updated (several times; last at 8:40PM). | ||
+ | * Nov. 01: suggested solutions for {{courses:is2011:hw1a_s.pdf|HW#1A}} and {{courses:is2011:hw1b_s.pdf|HW#1B}} available. | ||
+ | * Nov. 01: slides for Key Management and Distribution available. | ||
+ | * Oct. 12: slides for RSA and ECC available. | ||
* Oct. 04: {{courses:is2011:hw1b.pdf|HW#1B}} due on Oct. 18. | * Oct. 04: {{courses:is2011:hw1b.pdf|HW#1B}} due on Oct. 18. | ||
* Oct. 03: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available. | * Oct. 03: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available. | ||
Line 23: | Line 32: | ||
=====TAs and Office Hours===== | =====TAs and Office Hours===== | ||
- | TBA (for Prof. Sun), XTBAX (between the enclosing pair of X's)\\ | + | 蕭舜文 (for Prof. Sun), Xr93011@im.ntu.edu.twX (between the enclosing pair of X's)\\ |
楊富丞 (for Prof. Lee), Xtitanic.7485.ok@gmail.comX (between the enclosing pair of X's)\\ | 楊富丞 (for Prof. Lee), Xtitanic.7485.ok@gmail.comX (between the enclosing pair of X's)\\ | ||
王猶順 (for Prof. Lin), Xcloudwalker.wang@gmail.comX (between the enclosing pair of X's)\\ | 王猶順 (for Prof. Lin), Xcloudwalker.wang@gmail.comX (between the enclosing pair of X's)\\ | ||
Line 44: | Line 53: | ||
* Overview: basic concepts, architecture, model, etc. (.5 week: 09/13a) [slides: {{courses:is2011:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2011:Chapter1_Overview.pdf|Overview}}] | * Overview: basic concepts, architecture, model, etc. (.5 week: 09/13a) [slides: {{courses:is2011:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2011:Chapter1_Overview.pdf|Overview}}] | ||
* Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, pseudorandom number generation, stream ciphers, etc. (3.5 weeks: 09/13b, 09/20, 09/27, 10/04) [slides: {{courses:is2011:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2011:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2011:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2011:Chapter5_AES.pdf|AES}}, {{courses:is2011:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2011:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}] | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, pseudorandom number generation, stream ciphers, etc. (3.5 weeks: 09/13b, 09/20, 09/27, 10/04) [slides: {{courses:is2011:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2011:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2011:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2011:Chapter5_AES.pdf|AES}}, {{courses:is2011:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2011:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}] | ||
- | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, etc. (3 weeks: 10/11, 10/18, 10/25) [slides: {{courses:is2011:RSA.ppt|RSA}}, {{courses:is2011:ecc.ppt|ECC}}] | + | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, etc. (3 weeks: 10/11, 10/18, 10/25) [slides: {{courses:is2011:RSA.ppt|RSA}}, {{courses:is2011:ECC.ppt|ECC}}] |
- | * Key Management and User Authentication (1 week: 11/01) [slides: {{courses:is2011:Chapter14a_Key.pdf|Key Distribution}}] | + | * Key Management and User Authentication (1 week: 11/01) [{{courses:is2011:Mutual_Trust.ppt|slides}}] |
* Midterm (2011/11/08) | * Midterm (2011/11/08) | ||
* Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/22, 11/29, 12/06) [slides: {{courses:is2011:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2011:ch12.ppt|Message Authentication}}, {{courses:is2011:ch13.ppt|Digital Signatures}}] | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/22, 11/29, 12/06) [slides: {{courses:is2011:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2011:ch12.ppt|Message Authentication}}, {{courses:is2011:ch13.ppt|Digital Signatures}}] | ||
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (3 weeks: 12/13, 12/20, 12/27) | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/13, 12/20, 12/27) [ [[http://www.im.ntu.edu.tw/~sunny/courses_teaching.html|slides]] ] |
* Field Trip (2012/01/03) [{{courses:is2011:field_trip.pdf|schedule}}] | * Field Trip (2012/01/03) [{{courses:is2011:field_trip.pdf|schedule}}] | ||
* Final (2012/01/10) | * Final (2012/01/10) |