This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
cs-465:lectures [2016/11/21 09:50] seamons |
cs-465:lectures [2017/12/14 14:52] seamons |
||
---|---|---|---|
Line 1: | Line 1: | ||
'''Course Introduction''' | '''Course Introduction''' | ||
- | * Course Introduction [[media:cs-465:course_introduction.pdf | pdf]] | + | * Course Introduction [[media:cs-465:course_introduction_fall_2017.pdf | pdf]] |
'''Applied Cryptography''' | '''Applied Cryptography''' | ||
+ | * Termionology [[media:cs-465:Terminology.pdf| pdf]] [[media:cs-465:Terminology.pptx| pptx]] | ||
+ | |||
* Cryptography Introduction [[media:cs-465:Cryptography_Introduction.pdf| pdf]] [[media:cs-465:Cryptography_Introduction.pptx| pptx]] | * Cryptography Introduction [[media:cs-465:Cryptography_Introduction.pdf| pdf]] [[media:cs-465:Cryptography_Introduction.pptx| pptx]] | ||
+ | ** https://en.wikipedia.org/wiki/History_of_cryptography | ||
** http://en.wikipedia.org/wiki/Symmetric-key_algorithm | ** http://en.wikipedia.org/wiki/Symmetric-key_algorithm | ||
** [http://en.wikipedia.org/wiki/Block_cipher Block Cipher] | ** [http://en.wikipedia.org/wiki/Block_cipher Block Cipher] | ||
Line 28: | Line 31: | ||
** [http://en.wikipedia.org/wiki/NIST_hash_function_competition SHA-3] | ** [http://en.wikipedia.org/wiki/NIST_hash_function_competition SHA-3] | ||
** [http://csrc.nist.gov/groups/ST/hash/index.html NIST Hash Project] | ** [http://csrc.nist.gov/groups/ST/hash/index.html NIST Hash Project] | ||
+ | ** [https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html Chinese researchers find first SHA-1 collision 2005] | ||
+ | ** [https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html Google announces practical collsion SHA-1, Feb 2017] | ||
* MAC [[media:cs-465:MAC.pdf|pdf]] [[media:cs-465:MAC.pptx|pptx]] | * MAC [[media:cs-465:MAC.pdf|pdf]] [[media:cs-465:MAC.pptx|pptx]] | ||
Line 38: | Line 43: | ||
** [http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] | ** [http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] | ||
** [http://mathworld.wolfram.com/Diffie-HellmanProtocol.html Diffie-Hellman Protocol] | ** [http://mathworld.wolfram.com/Diffie-HellmanProtocol.html Diffie-Hellman Protocol] | ||
- | ** How does Eve conduct a Man-in-the-Middle attack? | + | ** How does Mallory conduct a Man-in-the-Middle attack? |
* RSA [[Media:cs-465:RSA.pdf|pdf]] [[Media:cs-465:RSA.pptx|pptx]] | * RSA [[Media:cs-465:RSA.pdf|pdf]] [[Media:cs-465:RSA.pptx|pptx]] | ||
Line 53: | Line 58: | ||
** [http://en.wikipedia.org/wiki/Trusted_third_party Trusted Third Party] | ** [http://en.wikipedia.org/wiki/Trusted_third_party Trusted Third Party] | ||
*** [http://en.wikipedia.org/wiki/DigiNotar DigiNotar attack] | *** [http://en.wikipedia.org/wiki/DigiNotar DigiNotar attack] | ||
- | *** [http://support.microsoft.com/kb/293817 Verisign Attack 2001] | + | *** [https://en.wikipedia.org/wiki/Verisign#Controversies Verisign Attack 2001] |
'''Authentication''' | '''Authentication''' | ||
Line 66: | Line 71: | ||
** [http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] | ** [http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] | ||
** [http://en.wikipedia.org/wiki/PBKDF2 PBKDF2] | ** [http://en.wikipedia.org/wiki/PBKDF2 PBKDF2] | ||
- | |||
- | * Strong Password Protocols [[Media:cs-465:strongpasswordprotocols.pdf|pdf]] [[Media:cs-465:strongpasswordprotocols.pptx|pptx]] | ||
'''Software Security''' | '''Software Security''' | ||
Line 80: | Line 83: | ||
* Social Engineering [[Media:cs-465:Social_Engineering.pdf|pdf]] [[Media:cs-465:Social_Engineering.pptx|pptx]] | * Social Engineering [[Media:cs-465:Social_Engineering.pdf|pdf]] [[Media:cs-465:Social_Engineering.pptx|pptx]] | ||
+ | ** [https://www.forbes.com/sites/laurashin/2017/01/04/be-prepared-the-top-social-engineering-scams-of-2017/#41a335ce7fec Top Social Engineering Scams of 2017] | ||
+ | ** [https://www.forbes.com/sites/laurashin/2017/01/04/7-ways-to-make-yourself-hack-proof/#41a402552b54 Ways to Make Yourself Hack Proof] | ||
- | '''Stamp Course Lecture Slides''' | ||
- | |||
- | * [http://www.cs.sjsu.edu/~stamp/infosec/powerpoint/2_AccessControl.pptx Access Control] slides #4-52 | ||
- | * [http://www.cs.sjsu.edu/~stamp/infosec/powerpoint/3_Protocols.pptx Protocols] slides #10-52 | ||