This shows you the differences between two versions of the page.
courses:is2015:main [2015/09/15 11:55] tsay [TAs] |
courses:is2015:main [2016/05/04 11:20] (current) tsay [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
+ | * 01/31: Grade Report available; contact Yih-Kuen Tsay by 5PM 02/01 if you have any question or request. | ||
+ | * 01/11: draft of {{courses:is2015:hw3_s.pdf|suggested solutions to HW#3}} available. | ||
+ | * 12/29: project description for Option #4 (Prof. Sun) revised. | ||
+ | * 12/22: for the field trip to the Acer eDC on **12/29**, the bus departs at **12:30PM** from the front of the Second Students' Activities Center; back to the departing place around 5:30--6:00PM. | ||
+ | * 12/15: project descriptions: {{courses:is2015:termproject_tsay.pdf|Option #1}} (Prof. Tsay), {{courses:is2015:termproject_lin.pdf|Option #2}} (Prof. Lin), {{courses:is2015:termproject_tsay3.pdf|Option #3}} (Prof. Tsay), and {{courses:is2015:termproject_sun.pdf|Option #4}} (Prof. Sun). | ||
+ | * 12/15: {{courses:is2015:termproject.pdf|Guidelines for Term Project}} announced; proposal due 12/29. | ||
+ | * 12/13: the deadline of HW#3 extended to 12/22. | ||
+ | * 12/09: {{courses:is2015:hw3.pdf|HW#3}} (//use International Edition of the textbook//!) due 12/15. | ||
+ | * 12/01: slides for Key Management and for User Authentication available. | ||
+ | * 11/24: slides for Hash Functions and for Message Authentication available. | ||
+ | * 10/13: {{courses:is2015:hw1b.pdf|HW#1B}} (//use International Edition of the textbook//!) due 10/27. | ||
+ | * 10/13: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available. | ||
+ | * 10/12: a note for Problem 3.13 in HW#1A: an equivalent of Figure S.1 may be found on Slide 14 for DES and Table S.3d on Slide 21. | ||
+ | * 10/06: the course schedule adjusted due to the typhoon break. | ||
+ | * 10/06: slides for AES available. | ||
+ | * 10/01: the deadline of HW#1A extended to 10/13. | ||
+ | * 09/22: {{courses:is2015:hw1a.pdf|HW#1A}} (//use International Edition of the textbook//!) due 10/06. | ||
+ | * 09/22: slides for Block Ciphers and DES and for Basic Number Theory and Finite Fields available. | ||
* 09/15: slides for Course Introduction, Subject Overview, and Classical Encryption Techniques available. | * 09/15: slides for Course Introduction, Subject Overview, and Classical Encryption Techniques available. | ||
* 09/14: website announced. This website is the sole source of all up to date course information and syllabus of Information Security 2015; there is no separate PDF version for the syllabus. | * 09/14: website announced. This website is the sole source of all up to date course information and syllabus of Information Security 2015; there is no separate PDF version for the syllabus. | ||
Line 38: | Line 56: | ||
* Overview: basic concepts, architecture, model, etc. (.5 week: 09/15a) [slides: {{courses:is2015:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2015:Chapter1_Overview.pdf|Overview}}] | * Overview: basic concepts, architecture, model, etc. (.5 week: 09/15a) [slides: {{courses:is2015:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2015:Chapter1_Overview.pdf|Overview}}] | ||
- | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, pseudorandom number generation, stream ciphers, etc. (3.5 weeks: 09/15b, 09/22, 09/29, 10/06) [slides: {{courses:is2015:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2015:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2015:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2015:Chapter5_AES.pdf|AES}}, {{courses:is2015:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2015:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}] | + | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, pseudorandom number generation, stream ciphers, etc. (3.5 weeks: 09/15b, 09/22, 10/06, 10/13) [slides: {{courses:is2015:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2015:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2015:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2015:Chapter5_AES.pdf|AES}}, {{courses:is2015:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2015:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}] |
- | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, etc. (3 weeks: 10/13, 10/20, 10/27) [slides: {{courses:is2015:RSA.ppt|RSA}}, {{courses:is2015:ECC.ppt|ECC}}] | + | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, etc. (3 weeks: 10/20, 10/27, 11/03) [slides: {{courses:is2015:RSA.ppt|RSA}}, {{courses:is2015:ECC.ppt|ECC}}] |
- | * Digital Signatures (1 week: 11/03) [{{courses:is2015:ch13_digital_signatures.pptx|slides}}] | + | * Digital Signatures (1 week: 11/10) [{{courses:is2015:ch13_digital_signatures.pptx|slides}}] |
- | * Midterm (2015/11/10) | + | * Midterm (2015/11/17) |
- | * Hash Functions (1 week: 11/17) [{{courses:is2015:ch11_hashfunctions.pptx|slides}}] | + | * Hash Functions (.5 week: 11/24a) [{{courses:is2015:ch11_hashfunctions.pptx|slides}}] |
- | * Message Authentication (1 week: 11/24) [{{courses:is2015:ch12_messageauthentication.pptx|slides}}] | + | * Message Authentication (.5 week: 11/24b) [{{courses:is2015:ch12_messageauthentication.pptx|slides}}] |
* Key Management and User Authentication (1 week: 12/01) [slides: {{courses:is2015:ch14_keymanagement.pptx|Key Management}}, {{courses:is2015:ch15_userauthentication.pptx|User Authentication}}] | * Key Management and User Authentication (1 week: 12/01) [slides: {{courses:is2015:ch14_keymanagement.pptx|Key Management}}, {{courses:is2015:ch15_userauthentication.pptx|User Authentication}}] | ||
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) [slides: [[https://www.space.ntu.edu.tw/navigate/s/B3BEAB6409C2443FA87244EE106F2631QQY|NTU Space]], {{courses:is2015:Firewall-DoS.pdf|PDF}} ] | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/08, 12/15, 12/22) [slides: {{courses:is2015:TLS.pdf|TLS}}, {{courses:is2015:Firewall-DoS.pdf|Firewall and DoS}}] |
- | * Field Trip (12/29) [{{courses:is2015:field_trip.pdf|schedule}}] | + | * Field Trip (12/29) [{{courses:is2015:FieldTrip.pdf|schedule}}] |
- | * Web Security (1 week: 01/05) [{{courses:is2015:WebSecurity.pdf|main slides}}, {{courses:is2015:OWASPWebGoat.pdf|OWASP WebGoat}}] | + | * Web Security (1 week: 01/05) [{{courses:is2015:WebSecurity.pdf|slides}}] |
* Final (2016/01/12) | * Final (2016/01/12) | ||