CSE539 -- Applied Cryptography, Spring 2018

Disclaimer:

This is a set of bullet points, class slides, and audio, that summarizes the class coverage of material. By no means is this comprehensive or is a substitute for class notes and attendance. Also, updating of this page is not guaranteed to be frequent.

 This page will be updated as class progresses....

Note: Audio files cannot be downloaded when off campus, unless if you use ASU VPN. |Thank you firewall|

If you are unable to open JNT files on Windows – check out this link

Class 1:

·         Introduction

·         Administrivia, Cryptography, Grading, Course contents

·         Number Theory

·         Course topics

·          |notes| PDF |audio|

 

Class 2:

·         Crypto basics

·         Kerchoffs Principle

·         Random numbers, hash functions and encryption

·         Confusion and Diffusion

·         |notes| PDF |audio|

 

Class 3:

·         Encryption History

·         Building block for encryption algorithms

·         Encryption modes

·         |notes| PDF |audio|

 

Class 4:

·         DES slides, description

·         AES slides

·         |notes| PDF |audio|

 

Class 5:

·         RC-4 cipher

·         Random Numbers

·         Generating CSPRNG

·         |notes| PDF |audio|

 

Class 6:

·         BBS

·         Random numbers using DBRG (standards)

·         Hash functions, slides

·         MD-5, SHA

·         Birthday attacks

·         |notes| PDF |audio|

 

Class 7:

·         Key Exchange

·         Merkle’s puzzles paper, explanation

·         Diffie helman Key Exchange - paper

·         |notes| PDF |audio|

 

Class 8:

·         DH key exchange and MITM attacks

·         RSA – the algorithm

·         Using public keys for authentication, key exchange, secret messaging, signatures, certificates

·         MITM attacks

·         |notes| PDF |audio|

 

Class 9:

·         Authentication

·         Password Storage

·         Unix Passwords and Salt

·         |notes| PDF |no audio|

 

Class 10:

·         Passwords and brute force

·         Dictionary Attacks and Rainbow tables

·         Kerberos

·         |notes| PDF |audio|

 

Class 11:

·         Needham and Schroder

·         Kerberos

·         Secret Communications (secrecy, authentication, integrity)

·         |notes| PDF |partial audio|

 

Class 12:

·         Secure Communications (resend, interlock, MITM)

·         Digital Signatures and Certificates

·         Certificate Authorities

·         |notes| PDF |audio|

 

Class 13:

·         Certificates, verification

·         Basic SSL protocol info

·         More details on SSL slides, specifications

·         |notes| PDF | audio|

 

Class 14:

·         Attacks on SSL

·         Smartcards

·         Time, hash based, Ubico

·         PKI cards

·         |notes| PDF | audio|

 

Class 15:

·         Computer Security

·         Vulnerabilities

·         Buffer overflow

·         Injection attacks

·         |notes| PDF | no audio|

 

Mid Term Exam

 

Class 16:

·         Root of Trust

·         Ken Thompson Turing award paper, another view

·         RSA and number theory proof

·         |notes| PDF | audio|

 

Class 17:

·         RSA property

·         Finding e and d

·         |notes| PDF | no audio|

 

Class 18:

·         Primality testing Fermat Test, Miller Rabin

·         Fast exponentiation

·         RPC-CRT explanation

·         |notes| PDF | audio|

 

Class 19:

·         Commutative and Homomorphic Encryption

·         Computing with encrypted data

·         Mental Poker

·         Bit commitment

·         Oblivious transfer

·         |notes| PDF | audio|

 

Class 20:

·         Oblivious transfer

·         Blind Signatures

·         Timestamping

·         |notes| PDF | audio|

 

Class 21:

·         Distributed Timestamps

·         Secure Multiparty – Dining Cryptographers

·         Anon Communications – Mixnets

·         Secret Splitting, Secret Sharing

·         Proxy Signatures

·         Group Signatures

·         |notes| PDF | audio|

 

Class 22:

·         Group Signatures

·         Fail Stop Signatures

·         Confirmable Signatures

·         Millionaire/Socialist Millionaire problems

·         Zero Knowledge Proofs

·         |notes| PDF | audio|

 

Class 23:

·         Zero Knowledge Proofs

·         Parallel and non-interactive ZKP

·         Feige Fiat Shamir proof of Identity

·         Off the record messaging talk by Ian Goldberg

·         |notes| PDF | audio|

 

Class 24:

·         OTR with Socialist Millionaire 1. OTR Page 2. OTR protocol 3. Explanation

·         Randomized Response Technique

·         |notes| PDF | audio|

 

Class 25:

·         Anonymous Money Orders

·         One Way Accumulators

·         Subliminal Channels

·         Simultaneous Contract Signing

·         Elections

·         |notes| PDF | audio|

 

Class 26:

·         Secure Elections

·         Bitcoin intro

·         |notes| PDF | audio|

 

Class 27:

·         Bitcoin, blockchain, proof of work

·         Digital Cash

·         |notes| PDF | audio|

 

Class 28:

·         Digital Cash

·         ECC

·         |notes| PDF | audio|

 

Class 29:

·         Review class

·         |notes| PDF | audio|