CSE47205C Hui Li
Introduction
- History: Caeser, Turing, Shannon, Ron Rivest, Adi Shamir, Leonard Adleman
- Classical Cryptography: Shift Cipher, Substitution Cipher, Affine Cipher, Permutation Cipher, Vigenere Cipher
- Network Security Introduction
Stream Ciphers
- Pseudorandom Sequence, Linear-Feedback Shift Registers
- Feedback Polynomial (Primitive Polynomials), Repeating Sequence of States
Block Ciphers
- Lucifer/DES: Encryption, Decryption, Mode of Operation, DES Controversy
- Rijndael/AES: Encryption, Decryption
Public-key CryptoSystem
- RSA: Extended Euclidean Algorithm, Euler Theorem, Primality Test, Attacks On RSA, Factoring Algorithms
- Merkle-Hellman Knapsack System
- Elliptic Curve Systems
Digital Signature Schemes
- ElGamal Signature Scheme, Digital Signature Standard
- Hash Functions, Birthday Attack, MD5
Key Distribution and Key Agreement
- Blom's Scheme
- Diffie-Hellman Scheme
- Kerberos,Application
Public Key Infrastructure
- Certificate, Certificate Authority, Life Cycle, Certification Path
Java Security Programming
- JCA/JCE
- Implementations: Certificate, DSS, MD, AES, RSA, SSL
System and Network Security
- Password Protection: Windows, Unix
- PGP and Email Security
- VPN, SSL and SET
- Malicious Software: Computer Virus, Trojan Horses, Vulnerability, Anti-Malware Strategies
Blockchain
- Cryptocurrencies, Double Spending, Bitcoin
- Decentralization, Hard forks
- Private Blockchain
网站备案