User Tools

Site Tools


courses:is2009:main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

courses:is2009:main [2009/09/29 14:04]
tsay
courses:is2009:main [2022/12/09 11:07] (current)
tsay2 [Announcements]
Line 3: Line 3:
  
 ===== Announcements ===== ===== Announcements =====
 +  * Feb. 01: Grade Report available.
 +  * Dec. 21: for the field trip to the Acer eDC on 12/29, the **buses depart at 12:30PM** from the front of the Second Students'​ Activities Center.
 +  * Dec. 03: description of {{courses:​is2009:​termproject_tsay.pdf|Term Project Option #1}} available.
 +  * Dec. 01: {{courses:​is2009:​termproject.pdf|Guidlines for Term Project}} available.
 +  * Nov. 05: slides for Public-Key Encryption and ECC available.
 +  * Oct. 06: {{courses:​is2009:​hw1b.pdf|HW#​1B}} due on Oct. 13.
 +  * Oct. 06: slides for Confidentiality Using Symmetric Encryption available.
   * Sep. 29: {{courses:​is2009:​hw1a.pdf|HW#​1A}} due on Oct. 6.   * Sep. 29: {{courses:​is2009:​hw1a.pdf|HW#​1A}} due on Oct. 6.
-  * Sep. 29: slides for AES and More Symmetric Ciphers available ​for download+  * Sep. 29: slides for AES and More Symmetric Ciphers available. 
-  * Sep. 22: slides for Block Ciphers and DES and for Finite Fields available ​for download.+  * Sep. 22: slides for Block Ciphers and DES and for Finite Fields available.
   * Sep. 15: {{courses:​is2009:​is2009info.pdf|PDF version}} of this page; slides for Course Overview, Introduction,​ and Classic Encryption Techniques available for download.   * Sep. 15: {{courses:​is2009:​is2009info.pdf|PDF version}} of this page; slides for Course Overview, Introduction,​ and Classic Encryption Techniques available for download.
  
Line 30: Line 37:
  
   * Introduction:​ basic concepts, architecture,​ model, etc. (.5 week: 09/15a) [slides: {{courses:​is2009:​Chapter0_Overview.pdf|Course Overview}}; {{courses:​is2009:​Chapter1_Introduction.pdf|Introduction}}]   * Introduction:​ basic concepts, architecture,​ model, etc. (.5 week: 09/15a) [slides: {{courses:​is2009:​Chapter0_Overview.pdf|Course Overview}}; {{courses:​is2009:​Chapter1_Introduction.pdf|Introduction}}]
-  * Symmetric Cryptography:​ classical techniques, block ciphers, DES,  nite elds, AES, stream ciphers, applications,​ etc. (3.5 weeks: 09/15b, 09/22, 09/29, 10/06) [slides: {{courses:​is2009:​Chapter2_Classical.pdf|Classical Techniques}},​ {{courses:​is2009:​Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:​is2009:​Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:​is2009:​Chapter5_AES.pdf|AES}},​ {{courses:​is2009:​Chapter6_Symmetric.pdf|More Symmetric Ciphers}}] +  * Symmetric Cryptography:​ classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications,​ etc. (3.5 weeks: 09/15b, 09/22, 09/29, 10/06) [slides: {{courses:​is2009:​Chapter2_Classical.pdf|Classical Techniques}},​ {{courses:​is2009:​Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:​is2009:​Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:​is2009:​Chapter5_AES.pdf|AES}},​ {{courses:​is2009:​Chapter6_Symmetric.pdf|More Symmetric Ciphers}}, {{courses:​is2009:​Chapter7_Confidentiality.pdf|Confidentiality Using Symmetric Encryption}}] 
-  * Public-Key (Asymmetric) Cryptography:​ number theory, RSA, key management, ECC, etc. (4 weeks: 10/13, 10/20, 10/27, 11/03)+  * Public-Key (Asymmetric) Cryptography:​ number theory, RSA, key management, ECC, etc. (4 weeks: 10/13, 10/20, 10/27, 11/​03) ​[slides: {{courses:​is2009:​public_key.ppt|Public-Key Encryption}},​ {{courses:​is2009:​ecc.ppt|ECC}}]
   * Midterm (2009/​11/​10)   * Midterm (2009/​11/​10)
   * Authentication,​ Hash Algorithms, and Digital Signatures (3 weeks: 11/17, 11/24, 12/01)   * Authentication,​ Hash Algorithms, and Digital Signatures (3 weeks: 11/17, 11/24, 12/01)
-  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) +  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) 
-  * Field Trip to the Acer eDC (12/29) +  * Field Trip to the Acer eDC (12/​29) ​[{{courses:​is2009:​field_trip.pdf|schedule}}] 
-  * System ​and Application Software ​Security: malicious software (including viruses)Web application securityetc. (1 week: 01/05)+  * Wrap-Up ​and Guest Lecture (Information ​Security ​That FitsJason YuehTrend Micro) ​(01/05)
   * Final (2010/​01/​12)   * Final (2010/​01/​12)
  
courses/is2009/main.1254204254.txt.gz · Last modified: 2009/09/29 14:04 by tsay