Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-465:lectures [2016/10/27 13:15]
seamons
cs-465:lectures [2017/12/14 14:52] (current)
seamons
Line 1: Line 1:
 '''​Course Introduction'''​ '''​Course Introduction'''​
-* Course Introduction [[media:​cs-465:​course_introduction.pdf | pdf]] +* Course Introduction [[media:​cs-465:​course_introduction_fall_2017.pdf | pdf]] 
  
 '''​Applied Cryptography'''​ '''​Applied Cryptography'''​
 +* Termionology [[media:​cs-465:​Terminology.pdf| pdf]] [[media:​cs-465:​Terminology.pptx| pptx]]
 +
 * Cryptography Introduction [[media:​cs-465:​Cryptography_Introduction.pdf| pdf]] [[media:​cs-465:​Cryptography_Introduction.pptx| pptx]] * Cryptography Introduction [[media:​cs-465:​Cryptography_Introduction.pdf| pdf]] [[media:​cs-465:​Cryptography_Introduction.pptx| pptx]]
 +** https://​en.wikipedia.org/​wiki/​History_of_cryptography
 ** http://​en.wikipedia.org/​wiki/​Symmetric-key_algorithm ** http://​en.wikipedia.org/​wiki/​Symmetric-key_algorithm
 ** [http://​en.wikipedia.org/​wiki/​Block_cipher Block Cipher] ** [http://​en.wikipedia.org/​wiki/​Block_cipher Block Cipher]
Line 28: Line 31:
 ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3] ** [http://​en.wikipedia.org/​wiki/​NIST_hash_function_competition SHA-3]
 ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project] ** [http://​csrc.nist.gov/​groups/​ST/​hash/​index.html NIST Hash Project]
 +** [https://​www.schneier.com/​blog/​archives/​2005/​02/​cryptanalysis_o.html Chinese researchers find first SHA-1 collision 2005]
 +** [https://​security.googleblog.com/​2017/​02/​announcing-first-sha1-collision.html Google announces practical collsion SHA-1, Feb 2017]
  
 * MAC [[media:​cs-465:​MAC.pdf|pdf]] [[media:​cs-465:​MAC.pptx|pptx]] * MAC [[media:​cs-465:​MAC.pdf|pdf]] [[media:​cs-465:​MAC.pptx|pptx]]
Line 38: Line 43:
 ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange] ** [http://​en.wikipedia.org/​wiki/​Diffie-Hellman_key_exchange Diffie-Hellman Key Exchange]
 ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol] ** [http://​mathworld.wolfram.com/​Diffie-HellmanProtocol.html Diffie-Hellman Protocol]
-** How does Eve conduct a Man-in-the-Middle attack?+** How does Mallory ​conduct a Man-in-the-Middle attack?
  
 * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]] * RSA [[Media:​cs-465:​RSA.pdf|pdf]] [[Media:​cs-465:​RSA.pptx|pptx]]
Line 53: Line 58:
 ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party] ** [http://​en.wikipedia.org/​wiki/​Trusted_third_party Trusted Third Party]
 *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack] *** [http://​en.wikipedia.org/​wiki/​DigiNotar DigiNotar attack]
-*** [http://support.microsoft.com/kb/293817 ​Verisign Attack 2001]+*** [https://en.wikipedia.org/wiki/Verisign#​Controversies ​Verisign Attack 2001]
  
 '''​Authentication'''​ '''​Authentication'''​
Line 61: Line 66:
 ** [https://​docs.google.com/​document/​d/​1C85G1FQjeE693p9ShNSFOdyW7yg1udRxkj9okmOamjc/​edit?​usp=sharing EXAMPLE] TLS cipher name example ** [https://​docs.google.com/​document/​d/​1C85G1FQjeE693p9ShNSFOdyW7yg1udRxkj9okmOamjc/​edit?​usp=sharing EXAMPLE] TLS cipher name example
  
-* Passwords ​ [[Media:​cs-465:​Passwords.pdf|pdf]] [[Media:​cs-465:​Passwords.pptx|pptx]] [http://​bit.ly/​1HAMls7 Beyond passwords - Multifactor auth, pasword vaults, single signon]+* Passwords ​ [[Media:​cs-465:​Passwords.pdf|pdf]] [[Media:​cs-465:​Passwords.pptx|pptx]] ​ 
 +** [http://​bit.ly/​1HAMls7 Beyond passwords - Multifactor auth, pasword vaults, single signon]
 ** [http://​arstechnica.com/​security/​2013/​10/​how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking/​ How the Bible and Youtube are Fueling the Next Frontier of Password Cracking] ** [http://​arstechnica.com/​security/​2013/​10/​how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking/​ How the Bible and Youtube are Fueling the Next Frontier of Password Cracking]
 ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away] ** [http://​www.nytimes.com/​2012/​11/​08/​technology/​personaltech/​how-to-devise-passwords-that-drive-hackers-away.html How to Devise Passwords that Drive Hackers Away]
 ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2] ** [http://​en.wikipedia.org/​wiki/​PBKDF2 PBKDF2]
- 
  
 '''​Software Security'''​ '''​Software Security'''​
Line 78: Line 83:
  
 * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]] * Social Engineering ​ [[Media:​cs-465:​Social_Engineering.pdf|pdf]] [[Media:​cs-465:​Social_Engineering.pptx|pptx]]
 +** [https://​www.forbes.com/​sites/​laurashin/​2017/​01/​04/​be-prepared-the-top-social-engineering-scams-of-2017/#​41a335ce7fec Top Social Engineering Scams of 2017]
 +** [https://​www.forbes.com/​sites/​laurashin/​2017/​01/​04/​7-ways-to-make-yourself-hack-proof/#​41a402552b54 Ways to Make Yourself Hack Proof]
  
-* Software Security 1 [[Media:​cs-465:​Software_Security_Part_A.pdf|pdf]] [[Media:​cs-465:​Software_Security_Part_A.pptx|pptx]] [http://​www.clift.org/​fred/​sqli.zip sqli examples from class] 
  
-* Software Security 2 [[Media:​cs-465:​Software_Security_Part_B.pdf|pdf]] [[Media:​cs-465:​Software_Security_Part_B.pptx|pptx]] [https://​docs.google.com/​presentation/​d/​1eqFB1IklngE5x2iEVxkU2q9cV-eFH7JJPF7TK9AE0BM/​edit?​usp=sharing Multi-Factor Authenticaiton,​ password vaults] 
cs-465/lectures.1477595721.txt.gz · Last modified: 2016/10/27 13:15 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0