This shows you the differences between two versions of the page.
courses:is2010:main [2010/10/05 08:43] tsay |
courses:is2010:main [2022/12/09 11:07] (current) tsay2 [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
+ | * Jan. 26: Grade Report available. | ||
+ | * Jan. 05: field trip report due on Jan. 11 at 2:20PM. | ||
+ | * Jan. 05: reminder: it is time to make an appointment for your term-project demo. | ||
+ | * Dec. 01: project descriptions: {{courses:is2010:termproject_tsay.pdf|Prof. Tsay}}, {{courses:is2010:termproject_lin.pdf|Prof. Lin}}, {{courses:is2010:termproject_lee.pdf|Prof. Lee}}, and [[courses:is2010:termproject_sun|Prof. Sun]]. | ||
+ | * Nov. 30: please check out the {{courses:is2010:termproject.pdf|General Guidelines for Term Project}}. | ||
+ | * Nov. 15: slides for Hash Functions, Message Authentication, and Digital Signatures available. | ||
+ | * Nov. 09: Suggested solutions to {{courses:is2010:hw1a_s.pdf|HW#1A}} and {{courses:is2010:hw1b_s.pdf|HW#1B}} available. | ||
+ | * Oct. 14: {{courses:is2010:hw1b.pdf|HW#1B}} due on Oct. 26. | ||
+ | * Oct. 12: slides for Random Number Generation and Stream Ciphers and for Key Distribution available. | ||
+ | * Oct. 05: slides for Finite Fields revised again. | ||
+ | * Oct. 05: slides for AES and Modes of Operation available. | ||
* Sep. 28: HW#1A due date postponed to Oct. 12. | * Sep. 28: HW#1A due date postponed to Oct. 12. | ||
* Sep. 28: slides for Finite Fields available (and revised slightly later on the day). | * Sep. 28: slides for Finite Fields available (and revised slightly later on the day). | ||
Line 24: | Line 35: | ||
=====TAs and Office Hours===== | =====TAs and Office Hours===== | ||
+ | 林陳駿 (for Prof. Sun) \\ | ||
李宜容 (for Prof. Lee), Xleeerin6@gmail.comX (between the enclosing pair of X's)\\ | 李宜容 (for Prof. Lee), Xleeerin6@gmail.comX (between the enclosing pair of X's)\\ | ||
許明宗 (for Prof. Lin), Xd94004@im.ntu.edu.twX (between the enclosing pair of X's)\\ | 許明宗 (for Prof. Lin), Xd94004@im.ntu.edu.twX (between the enclosing pair of X's)\\ | ||
Line 43: | Line 55: | ||
* Overview: basic concepts, architecture, model, etc. (.5 week: 09/14a) [slides: {{courses:is2010:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2010:Chapter1_Overview.pdf|Overview}}] | * Overview: basic concepts, architecture, model, etc. (.5 week: 09/14a) [slides: {{courses:is2010:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2010:Chapter1_Overview.pdf|Overview}}] | ||
- | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications, etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:is2010:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2010:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2010:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2010:Chapter5_AES.pdf|AES}}, {{courses:is2010:Chapter6_Symmetric.pdf|More Symmetric Ciphers}}, {{courses:is2010:Chapter7_Confidentiality.pdf|Confidentiality Using Symmetric Encryption}}] | + | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications, etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:is2010:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2010:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2010:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2010:Chapter5_AES.pdf|AES}}, {{courses:is2010:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2010:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}, {{courses:is2010:Chapter14a_Key.pdf|Key Distribution}}] |
* Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:is2010:public_key.ppt|Public-Key Encryption}}, {{courses:is2010:ecc.ppt|ECC}}] | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:is2010:public_key.ppt|Public-Key Encryption}}, {{courses:is2010:ecc.ppt|ECC}}] | ||
* Midterm (2010/11/09) | * Midterm (2010/11/09) | ||
- | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/16, 11/23, 11/30) | + | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/16, 11/23, 11/30) [slides: {{courses:is2010:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2010:ch12.ppt|Message Authentication}}, {{courses:is2010:ch13.ppt|Digital Signatures}}] |
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28) | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28) |
* Field Trip to the Acer eDC (2011/01/04) [{{courses:is2010:field_trip.pdf|schedule}}] | * Field Trip to the Acer eDC (2011/01/04) [{{courses:is2010:field_trip.pdf|schedule}}] | ||
* Final (2011/01/11) | * Final (2011/01/11) |