User Tools

Site Tools


courses:is2010:main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

courses:is2010:main [2010/10/05 08:43]
tsay
courses:is2010:main [2022/12/09 11:07] (current)
tsay2 [Announcements]
Line 3: Line 3:
  
 ===== Announcements ===== ===== Announcements =====
 +  * Jan. 26: Grade Report available.
 +  * Jan. 05: field trip report due on Jan. 11 at 2:20PM.
 +  * Jan. 05: reminder: it is time to make an appointment for your term-project demo.
 +  * Dec. 01: project descriptions:​ {{courses:​is2010:​termproject_tsay.pdf|Prof. Tsay}}, {{courses:​is2010:​termproject_lin.pdf|Prof. Lin}}, {{courses:​is2010:​termproject_lee.pdf|Prof. Lee}}, and [[courses:​is2010:​termproject_sun|Prof. Sun]].
 +  * Nov. 30: please check out the {{courses:​is2010:​termproject.pdf|General Guidelines for Term Project}}.
 +  * Nov. 15: slides for Hash Functions, Message Authentication,​ and Digital Signatures available.
 +  * Nov. 09: Suggested solutions to {{courses:​is2010:​hw1a_s.pdf|HW#​1A}} and {{courses:​is2010:​hw1b_s.pdf|HW#​1B}} available.
 +  * Oct. 14: {{courses:​is2010:​hw1b.pdf|HW#​1B}} due on Oct. 26.
 +  * Oct. 12: slides for Random Number Generation and Stream Ciphers and for Key Distribution available.
 +  * Oct. 05: slides for Finite Fields revised again.
 +  * Oct. 05: slides for AES and Modes of Operation available.
   * Sep. 28: HW#1A due date postponed to Oct. 12.   * Sep. 28: HW#1A due date postponed to Oct. 12.
   * Sep. 28: slides for Finite Fields available (and revised slightly later on the day).   * Sep. 28: slides for Finite Fields available (and revised slightly later on the day).
Line 24: Line 35:
 =====TAs and Office Hours===== =====TAs and Office Hours=====
  
 +林陳駿 (for Prof. Sun) \\
 李宜容 (for Prof. Lee), Xleeerin6@gmail.comX (between the enclosing pair of X's)\\ 李宜容 (for Prof. Lee), Xleeerin6@gmail.comX (between the enclosing pair of X's)\\
 許明宗 (for Prof. Lin), Xd94004@im.ntu.edu.twX (between the enclosing pair of X's)\\ 許明宗 (for Prof. Lin), Xd94004@im.ntu.edu.twX (between the enclosing pair of X's)\\
Line 43: Line 55:
  
   * Overview: basic concepts, architecture,​ model, etc. (.5 week: 09/14a) [slides: {{courses:​is2010:​Chapter0_Introduction.pdf|Course Introduction}};​ {{courses:​is2010:​Chapter1_Overview.pdf|Overview}}]   * Overview: basic concepts, architecture,​ model, etc. (.5 week: 09/14a) [slides: {{courses:​is2010:​Chapter0_Introduction.pdf|Course Introduction}};​ {{courses:​is2010:​Chapter1_Overview.pdf|Overview}}]
-  * Symmetric Cryptography:​ classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications,​ etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:​is2010:​Chapter2_Classical.pdf|Classical Techniques}},​ {{courses:​is2010:​Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:​is2010:​Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:​is2010:​Chapter5_AES.pdf|AES}},​ {{courses:​is2010:​Chapter6_Symmetric.pdf|More Symmetric ​Ciphers}}, {{courses:​is2010:​Chapter7_Confidentiality.pdf|Confidentiality Using Symmetric Encryption}}]+  * Symmetric Cryptography:​ classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications,​ etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:​is2010:​Chapter2_Classical.pdf|Classical Techniques}},​ {{courses:​is2010:​Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:​is2010:​Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:​is2010:​Chapter5_AES.pdf|AES}},​ {{courses:​is2010:​Chapter6_Modes.pdf|Multiple ​Ciphers ​and Modes of Operation}}, {{courses:​is2010:​Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}, {{courses:​is2010:​Chapter14a_Key.pdf|Key Distribution}}]
   * Public-Key (Asymmetric) Cryptography:​ number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:​is2010:​public_key.ppt|Public-Key Encryption}},​ {{courses:​is2010:​ecc.ppt|ECC}}]   * Public-Key (Asymmetric) Cryptography:​ number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:​is2010:​public_key.ppt|Public-Key Encryption}},​ {{courses:​is2010:​ecc.ppt|ECC}}]
   * Midterm (2010/​11/​09)   * Midterm (2010/​11/​09)
-  * Data Integrity Algorithms: hash algorithms, message authentication,​ and digital signatures (3 weeks: 11/16, 11/23, 11/30) +  * Data Integrity Algorithms: hash algorithms, message authentication,​ and digital signatures (3 weeks: 11/16, 11/23, 11/​30) ​[slides: {{courses:​is2010:​ch11.ppt|Cryptographic Hash Functions}},​ {{courses:​is2010:​ch12.ppt|Message Authentication}},​ {{courses:​is2010:​ch13.ppt|Digital Signatures}}] 
-  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28)+  * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28)
   * Field Trip to the Acer eDC (2011/​01/​04) [{{courses:​is2010:​field_trip.pdf|schedule}}]   * Field Trip to the Acer eDC (2011/​01/​04) [{{courses:​is2010:​field_trip.pdf|schedule}}]
   * Final (2011/​01/​11)   * Final (2011/​01/​11)
courses/is2010/main.1286239428.txt.gz · Last modified: 2010/10/05 08:43 by tsay