User Tools

Site Tools


courses:is2013:main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

courses:is2013:main [2013/09/24 11:14]
tsay
courses:is2013:main [2014/09/18 20:24] (current)
tsay [Announcements]
Line 3: Line 3:
  
 ===== Announcements ===== ===== Announcements =====
-  * 09/24: {{courses:is2012:​hw1a.pdf|HW#​1A}} due 10/01.+  ​* 01/22: Grade Report available; contact Yih-Kuen Tsay by 5PM 01/23 if you have any question or request. 
 +  * 12/17: the class will meet in Room 106 of NTU C&INC (台大計中) on 12/24. 
 +  * 11/26: project descriptions:​ {{courses:​is2013:​termproject_tsay.pdf|Prof. Tsay}}, {{courses:​is2013:​termproject_lin.pdf|Prof. Lin}}, {{courses:​is2013:​termproject_lee.pdf|Prof. Lee}}, and {{courses:​is2013:​termproject_sun.pdf|Prof. Sun}}. 
 +  * 11/26: {{courses:​is2013:​termproject.pdf|Guidelines for Term Project}} announced; proposal due on Dec. 24. 
 +  * 11/26: slides for Cryptographic Hash Functions and Message Authentication revised. 
 +  * 11/11: slides for Cryptographic Hash Functions, Message Authentication,​ and Digital Signatures available. 
 +  * 10/29: slides for Public-Key Cryptography and for Key Management and User Authentication available. 
 +  * 10/02: {{courses:​is2013:​hw1b.pdf|HW#​1B}} due 10/08. 
 +  * 10/01: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available 
 +  ​* 09/24: {{courses:is2013:​hw1a.pdf|HW#​1A}} due 10/01.
   * 09/23: slides for AES available.   * 09/23: slides for AES available.
   * 09/17: slides for Block Ciphers and DES and for Basic Number Theory and Finite Fields available.   * 09/17: slides for Block Ciphers and DES and for Basic Number Theory and Finite Fields available.
   * 09/09: slides for Course Introduction,​ Subject Overview, and Classical Encryption Techniques available.   * 09/09: slides for Course Introduction,​ Subject Overview, and Classical Encryption Techniques available.
   * 09/04: this website is the sole source of all up to date course information and syllabus; there is no separate PDF version.   * 09/04: this website is the sole source of all up to date course information and syllabus; there is no separate PDF version.
- 
 =====Instructors===== =====Instructors=====
 [[http://​www.im.ntu.edu.tw/​~sunny/​|Yeali S. Sun (孫雅麗)]],​ Room 909, Management II, 3366-1195, Xsunny@ntu.edu.twX (between the enclosing pair of X's)\\ [[http://​www.im.ntu.edu.tw/​~sunny/​|Yeali S. Sun (孫雅麗)]],​ Room 909, Management II, 3366-1195, Xsunny@ntu.edu.twX (between the enclosing pair of X's)\\
-[[http://newweb.management.ntu.edu.tw/​chinese/im/teacher_detail.php?​menu1=02&​menu2=05&​tid=9|Anthony J.T. Lee (李瑞庭)]],​ Room 705, Management II, 3366-1188, Xjtlee@ntu.edu.twX (between the enclosing pair of X'​s)\\ +[[http://exp.management.ntu.edu.tw/​zh-TW/IM/teachers/6|Anthony J.T. Lee (李瑞庭)]],​ Room 705, Management II, 3366-1188, Xjtlee@ntu.edu.twX (between the enclosing pair of X'​s)\\ 
-[[http://newweb.management.ntu.edu.tw/​chinese/im/teacher_detail.php?​menu1=02&​menu2=05&​tid=12|Yeong-Sung Lin (林永松)]],​ Room 808, Management II, 3366-1191, Xyeongsunglin@gmail.comX (between the enclosing pair of X's)\\+[[http://exp.management.ntu.edu.tw/​zh-TW/IM/teachers/18|Yeong-Sung Lin (林永松)]],​ Room 808, Management II, 3366-1191, Xyeongsunglin@gmail.comX (between the enclosing pair of X's)\\
 [[http://​im.ntu.edu.tw/​~tsay/​|Yih-Kuen Tsay (蔡益坤)]],​ Room 1108, Management II, 3366-1189, Xtsay@ntu.edu.twX (between the enclosing pair of X's) [[http://​im.ntu.edu.tw/​~tsay/​|Yih-Kuen Tsay (蔡益坤)]],​ Room 1108, Management II, 3366-1189, Xtsay@ntu.edu.twX (between the enclosing pair of X's)
  
Line 47: Line 55:
   * Midterm (2013/​11/​05)   * Midterm (2013/​11/​05)
   * Data Integrity Algorithms: hash algorithms, message authentication,​ and digital signatures (3 weeks: 11/12, 11/19, 11/26) [slides: {{courses:​is2013:​ch11.pptx|Cryptographic Hash Functions}},​ {{courses:​is2013:​ch12.pptx|Message Authentication}},​ {{courses:​is2013:​ch13.pptx|Digital Signatures}}]   * Data Integrity Algorithms: hash algorithms, message authentication,​ and digital signatures (3 weeks: 11/12, 11/19, 11/26) [slides: {{courses:​is2013:​ch11.pptx|Cryptographic Hash Functions}},​ {{courses:​is2013:​ch12.pptx|Message Authentication}},​ {{courses:​is2013:​ch13.pptx|Digital Signatures}}]
-  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, ​fi rewalls, denial of service, etc. (3 weeks: 12/03, 12/10, 12/17) [ [[http://​www.im.ntu.edu.tw/​~sunny/​courses_teaching.html|slides]] ]+  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, ​firewalls, denial of service, etc. (3 weeks: 12/03, 12/10, 12/17) [ [[http://​www.im.ntu.edu.tw/​~sunny/​courses_teaching.html|slides]] ]
   * Field Trip (2013/​12/​24) [{{courses:​is2013:​field_trip.pdf|schedule}}]   * Field Trip (2013/​12/​24) [{{courses:​is2013:​field_trip.pdf|schedule}}]
   * Invited Talks (2013/​12/​31) ​   * Invited Talks (2013/​12/​31) ​
-  * Final (2014/01/06)+  * Final (2014/01/07)
  
 =====Web/​FTP Site===== =====Web/​FTP Site=====
Line 66: Line 74:
   - //Building and Managing Virtual Private Networks//, D. Kosiur, John Wiley & Sons, 1998.   - //Building and Managing Virtual Private Networks//, D. Kosiur, John Wiley & Sons, 1998.
   - //Building SET Application for Secure Transactions//,​ M.S. Merkow, J. Breithaupt, and K. Wheeler, John Wiley & Sons, 1998.   - //Building SET Application for Secure Transactions//,​ M.S. Merkow, J. Breithaupt, and K. Wheeler, John Wiley & Sons, 1998.
-  - //Practical UNIX and Internet Security, 3rd Edition//, S. Gar nkel, G. Spa ord, and A. Schwartz, O'​Reilly & Associates, 2003.+  - //Practical UNIX and Internet Security, 3rd Edition//, S. Garfinkel, G. Spafford, and A. Schwartz, O'​Reilly & Associates, 2003.
   - //Secure Programming with Static Analysis//, B. Chess and J. West, Addison-Wesley,​ 2007.   - //Secure Programming with Static Analysis//, B. Chess and J. West, Addison-Wesley,​ 2007.
   - //Operating System Concepts, 8th Edition// (Chapters 14 and 15), A. Silberschatz,​ P.B. Galvin, and G. Gagne, Wiley, 2008.   - //Operating System Concepts, 8th Edition// (Chapters 14 and 15), A. Silberschatz,​ P.B. Galvin, and G. Gagne, Wiley, 2008.
Line 83: Line 91:
 [Midterm 2011: {{courses:​is:​mid2011I.pdf|Part I}}] \\ [Midterm 2011: {{courses:​is:​mid2011I.pdf|Part I}}] \\
 [Midterm 2012: {{courses:​is:​mid2012I.pdf|Part I}}]  [Midterm 2012: {{courses:​is:​mid2012I.pdf|Part I}}] 
 +[Final 2012: {{courses:​is:​final2012I.pdf|Part I}}] 
  
courses/is2013/main.1379992464.txt.gz · Last modified: 2013/09/24 11:14 by tsay