This shows you the differences between two versions of the page.
courses:is2010:main [2011/01/26 23:18] tsay |
courses:is2010:main [2022/12/09 11:07] (current) tsay2 [Announcements] |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Announcements ===== | ===== Announcements ===== | ||
- | * Jan. 26: {{courses:is2010:is2010grade.pdf|Grade Report}} available. | + | * Jan. 26: Grade Report available. |
* Jan. 05: field trip report due on Jan. 11 at 2:20PM. | * Jan. 05: field trip report due on Jan. 11 at 2:20PM. | ||
* Jan. 05: reminder: it is time to make an appointment for your term-project demo. | * Jan. 05: reminder: it is time to make an appointment for your term-project demo. | ||
Line 55: | Line 55: | ||
* Overview: basic concepts, architecture, model, etc. (.5 week: 09/14a) [slides: {{courses:is2010:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2010:Chapter1_Overview.pdf|Overview}}] | * Overview: basic concepts, architecture, model, etc. (.5 week: 09/14a) [slides: {{courses:is2010:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2010:Chapter1_Overview.pdf|Overview}}] | ||
- | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications, etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:is2010:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2010:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2010:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2010:Chapter5_AES.pdf|AES}}, {{courses:is2010:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2010:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}, {{courses:is2010:Chapter14a_Key.pdf|Key Distribution}}]] | + | * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, stream ciphers, applications, etc. (4.5 weeks: 09/14b, 09/21, 09/28, 10/05, 10/12) [slides: {{courses:is2010:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2010:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2010:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2010:Chapter5_AES.pdf|AES}}, {{courses:is2010:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2010:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}, {{courses:is2010:Chapter14a_Key.pdf|Key Distribution}}] |
* Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:is2010:public_key.ppt|Public-Key Encryption}}, {{courses:is2010:ecc.ppt|ECC}}] | * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, key management, etc. (3 weeks: 10/19, 10/26, 11/02) [slides: {{courses:is2010:public_key.ppt|Public-Key Encryption}}, {{courses:is2010:ecc.ppt|ECC}}] | ||
* Midterm (2010/11/09) | * Midterm (2010/11/09) | ||
* Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/16, 11/23, 11/30) [slides: {{courses:is2010:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2010:ch12.ppt|Message Authentication}}, {{courses:is2010:ch13.ppt|Digital Signatures}}] | * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/16, 11/23, 11/30) [slides: {{courses:is2010:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2010:ch12.ppt|Message Authentication}}, {{courses:is2010:ch13.ppt|Digital Signatures}}] | ||
- | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, rewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28) | + | * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (4 weeks: 12/07, 12/14, 12/21, 12/28) |
* Field Trip to the Acer eDC (2011/01/04) [{{courses:is2010:field_trip.pdf|schedule}}] | * Field Trip to the Acer eDC (2011/01/04) [{{courses:is2010:field_trip.pdf|schedule}}] | ||
* Final (2011/01/11) | * Final (2011/01/11) |