Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
cs-465:lectures [2017/09/05 11:05]
seamons
cs-465:lectures [2017/12/14 14:48]
seamons
Line 31: Line 31:
 ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3] ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3]
 ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project] ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project]
 +** [https://​www.schneier.com/​blog/​archives/​2005/​02/​cryptanalysis_o.html Chinese researchers find first SHA-1 collision 2005]
 +** [https://​security.googleblog.com/​2017/​02/​announcing-first-sha1-collision.html Google announces practical collsion SHA-1, Feb 2017]
  
 * MAC [[media:​cs-465:​MAC.pdf|pdf]] [[media:​cs-465:​MAC.pptx|pptx]] * MAC [[media:​cs-465:​MAC.pdf|pdf]] [[media:​cs-465:​MAC.pptx|pptx]]
Line 41: Line 43:
 ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange]
 ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol] ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol]
-** How does Eve conduct a Man-in-the-Middle attack?+** How does Mallory ​conduct a Man-in-the-Middle attack?
  
 * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]] * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]]
Line 56: Line 58:
 ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party] ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party]
 *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack] *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack]
-*** [http://support.microsoft.com/kb/293817 ​Verisign Attack 2001]+*** [https://en.wikipedia.org/wiki/Verisign#​Controversies ​Verisign Attack 2001]
  
 '''​Authentication'''​ '''​Authentication'''​
Line 69: Line 71:
 ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away]
 ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2] ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2]
- 
-* Strong Password Protocols ​ [[Media:​cs-465:​strongpasswordprotocols.pdf|pdf]] [[Media:​cs-465:​strongpasswordprotocols.pptx|pptx]] ​ 
  
 '''​Software Security'''​ '''​Software Security'''​
Line 83: Line 83:
  
 * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]] * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]]
- 
-'''​Stamp Course Lecture Slides'''​ 
- 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​2_AccessControl.pptx Access Control] slides #4-52 
-* [http://​www.cs.sjsu.edu/​~stamp/​infosec/​powerpoint/​3_Protocols.pptx Protocols] slides #10-52 
  
cs-465/lectures.txt ยท Last modified: 2017/12/14 14:52 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0