This shows you the differences between two versions of the page.
courses:is2009:main [2009/11/05 09:07] tsay |
courses:is2009:main [2022/12/09 11:07] (current) tsay2 [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
+ | * Feb. 01: Grade Report available. | ||
+ | * Dec. 21: for the field trip to the Acer eDC on 12/29, the **buses depart at 12:30PM** from the front of the Second Students' Activities Center. | ||
+ | * Dec. 03: description of {{courses:is2009:termproject_tsay.pdf|Term Project Option #1}} available. | ||
+ | * Dec. 01: {{courses:is2009:termproject.pdf|Guidlines for Term Project}} available. | ||
* Nov. 05: slides for Public-Key Encryption and ECC available. | * Nov. 05: slides for Public-Key Encryption and ECC available. | ||
* Oct. 06: {{courses:is2009:hw1b.pdf|HW#1B}} due on Oct. 13. | * Oct. 06: {{courses:is2009:hw1b.pdf|HW#1B}} due on Oct. 13. | ||
Line 33: | Line 37: | ||
* Introduction: basic concepts, architecture, model, etc. (.5 week: 09/15a) [slides: {{courses:is2009:Chapter0_Overview.pdf|Course Overview}}; {{courses:is2009:Chapter1_Introduction.pdf|Introduction}}] | * Introduction: basic concepts, architecture, model, etc. (.5 week: 09/15a) [slides: {{courses:is2009:Chapter0_Overview.pdf|Course Overview}}; {{courses:is2009:Chapter1_Introduction.pdf|Introduction}}] | ||
- | * Symmetric Cryptography: classical techniques, block ciphers, DES, nite elds, AES, stream ciphers, applications, etc. (3.5 weeks: 09/15b, 09/22, 09/29, 10/06) [slides: {{courses:is2009:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2009:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2009:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2009:Chapter5_AES.pdf|AES}}, {{courses:is2009:Chapter6_Symmetric.pdf|More Symmetric Ciphers}}, {{courses:is2009:Chapter7_Confidentiality.pdf|Confidentiality Using Symmetric Encryption}}] | + | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications, etc. (3.5 weeks: 09/15b, 09/22, 09/29, 10/06) [slides: {{courses:is2009:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2009:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2009:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2009:Chapter5_AES.pdf|AES}}, {{courses:is2009:Chapter6_Symmetric.pdf|More Symmetric Ciphers}}, {{courses:is2009:Chapter7_Confidentiality.pdf|Confidentiality Using Symmetric Encryption}}] |
* Public-Key (Asymmetric) Cryptography: number theory, RSA, key management, ECC, etc. (4 weeks: 10/13, 10/20, 10/27, 11/03) [slides: {{courses:is2009:public_key.ppt|Public-Key Encryption}}, {{courses:is2009:ecc.ppt|ECC}}] | * Public-Key (Asymmetric) Cryptography: number theory, RSA, key management, ECC, etc. (4 weeks: 10/13, 10/20, 10/27, 11/03) [slides: {{courses:is2009:public_key.ppt|Public-Key Encryption}}, {{courses:is2009:ecc.ppt|ECC}}] | ||
* Midterm (2009/11/10) | * Midterm (2009/11/10) | ||
* Authentication, Hash Algorithms, and Digital Signatures (3 weeks: 11/17, 11/24, 12/01) | * Authentication, Hash Algorithms, and Digital Signatures (3 weeks: 11/17, 11/24, 12/01) | ||
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) |
- | * Field Trip to the Acer eDC (12/29) | + | * Field Trip to the Acer eDC (12/29) [{{courses:is2009:field_trip.pdf|schedule}}] |
- | * System and Application Software Security: malicious software (including viruses), Web application security, etc. (1 week: 01/05) | + | * Wrap-Up and Guest Lecture (Information Security That Fits, Jason Yueh, Trend Micro) (01/05) |
* Final (2010/01/12) | * Final (2010/01/12) | ||