CSE539 -- Applied Cryptography, Spring 2015

Disclaimer:

This is a set of bullet points, class slides, and audio, that summarizes the class coverage of material. By no means is this comprehensive or is a substitute for class notes and attendance. Also, updating of this page is not guaranteed to be frequent.

 This page will be updated as class progresses....

Note: Audio files cannot be downloaded when off campus, unless if you use ASU VPN. |Thank you firewall|

Class 1:

·         Introduction

·         Administrivia, Cryptography, Grading, Course contents

·          |notes| |audio|

 

Class 2:

·         Cryptography

·         Large Numbers

·         Threat Models

·         Number Theory

·         Hashing, encryption

·          |notes, notes-pdf, audio|

 

Class 3:

·         Ceaser Cipher, Vignere cipher

·         Kasiski attack

·         Substitution Permutation networks, Feistel Functions

·         DES intro

·         |audio|

 

Class 4:

·         DES  slides, specs

·         One Time Pad

·         AES, slides

·         |notes, notes-pdf, audio|

 

Class 5:

·         Ken Thompson Trust

·         Root of Trust, secure booting

·         Vulnerabilities

·         Attacks

·          |notes, notes-pdf, audio|

 

Class 6:

·         Vulnerabilities

·         Attacks

·          |notes, notes-pdf, audio|

 

Class 7:

·         Random Numbers

·         CSPRNG

·         Hashing, secure hasing

·         MD-5

·          |notes, notes-pdf, audio|

 

Class 8:

·         SHA-1

·         Birthday Attack

·         Merkle’s puzzles

·         Diffie Helman

·          |notes, notes-pdf, no audio|

 

Class 9:

·         Cryptanalysis

·         Diffie-Helman

·         RSA

·         Authentication

·          |notes, notes-pdf, audio|

 

Class 10:

·         Authentication

·         Challenge response

·         Password storage and attacks

·          |notes, notes-pdf, audio|

 

Class 11:

·         Dictionary Attacks

·         Rainbow tables

·         Smartcards

·          |notes, notes-pdf, audio|

 

Class 12:

·         Smartcards

·         Cryptographic Protocols

·         Kerberos protocol

·          |notes, notes-pdf, audio|

 

Class 13:

·         Kerberos and integrity

·         Needs for authentication and integrity per message

·         Public key encryption and communications

·         Hybrid communications

·         Authentication problems using public keys

·          |notes, notes-pdf, audio|

 

Class 14:

·         Digital Signatures

·         Digital Certificates

·         Web of Trust

·         Certificate authorities

·          |notes, notes-pdf, audio|

 

Class 15:

·         Certificates, CAs and public keys

·         Hierarchical Certs

·         SSL Snif

·         Single Sign on

·          |notes, notes-pdf, audio|

 

Class 16

·         Review

·         Chip and PIN cards

·         Certificates and Attacks

·         Root Certificates and Storage

·         Slides … slides

·         | notes, notes-PDF, audio |

 

MID TERM EXAM

 

Class 17

·         SSL … slides

·         RSA and Number theory |doc|

·         | notes, notes-PDF, audio |

 

Class 18

·         RSA – how it works | proof and algoritjhms|

·         | notes, notes-PDF, audio |

 

Class 19

·         Primality testing

·         Fast exponentiation

·         Protocols

·         Mental Poker

·         Oblivious Transfer

·         | notes, notes-PDF, audio-1, audio-2 |

 

Class 20

·         Oblivious Transfer

·         Millionaires Problem, Socialist Millionaires Problem

·         Dining Cryptographers Problem, DC Net

·         MIXnets and anonymous messaging (Onion routing)

·         Secret Splitting

·         Secret Sharing

·         | notes, notes-PDF, audio |

 

Class 21

·         Timestamping

·         Proxy Signatures

·         Group Signatures

·         Blind Signatures

·         | notes, notes-PDF, audio |

 

Class 22

·         Mid Term Discussion |notes,  audio |

·         Undeniable Signatures and Fail Stop Signatures

·         Bit Commitment

·         Zero Knowledge Proofs

·         | notes, notes-PDF, audio missing |

 

Class 23

·         ZKP

·         Graph Isomorphism

·         FFS

·         | notes, notes-PDF, audio |

 

Class 24

·         Randomized Response Technique

·         Blind Signatures ŕ Anonymous Money Orders

·         Simultaneous Contract Signing

·         Subliminal Channels

·         | notes, notes-PDF, audio |

 

Class 25

·         Computing with Encrypted Data

·         Computing with Encrypted functions (also obfuscation)

·         Proof Carrying Code

·         Bitcoin -- slides, paper

·         | notes, notes-PDF, audio |

 

Class 26

·         Electronic Voting

·         Secure Election protocols

·         CTF, CLA and several approaches

·         Cheating methods….

·         | notes, notes-PDF, no audio|

 

Class 27

·         Digital Cash

·         Chaffing and Winnowing [paper]

·         | notes, notes-PDF, audio |

 

Class 28

·         Review

·         | notes, notes-PDF, audio |