COS 496: Information Security

Spring 1999

General information
Schedule
Homework


Date Lecture topic Reading Hand In
 
Tue 2 Feb Introductory Case Study
Thu 4 Feb Goals and Vulnerabilities chapter 1
Tue 9 Feb Secret-Decoder-Ring Crypto chapter 2
Thu 11 Feb Modern Ciphers 3.1-3.5, 3.8-3.9
Tue 16 Feb Other Crypto Primitives 3.6-3.7 Assignment 1: Breaking a Cryptosystem
Thu 18 Feb Crypto Protocols chapter 4
Tue 23 Feb Key Management
Thu 25 Feb Viruses 5.1 Assignment 2: Lottery Security Design
Tue 2 Mar Containing Malicious Programs 5.2-5.6
Thu 4 Mar Buggy Programs and Security
Tue 9 Mar Memory Safety Assignment 3: Lottery Analysis
Thu 11 Mar Secure Services 6.1, 6.3
Tue 23 Mar Military-Style Security Policies chapter 7
Thu 25 Mar Commercial-Style Security Policies Assignment 4: Forensic Security
Tue 30 Mar Network Security: Protecting the Infrastructure 9.1-9.3
Thu 1 Apr Firewalls and Virtual Private Networks 9.5
Tue 6 Apr Privacy and Anonymity Project Proposal
Thu 8 Apr E-Commerce Security: On-line systems
Tue 13 Apr E-Commerce Security: Off-line systems Project Description
Thu 15 Apr Physical Security and Tamper-Resistant Devices
Tue 20 Apr Proofs about Programs
Thu 22 Apr Intellectual Property and Copy Protection chapter 11
Tue 27 Apr Law, Crime, Ethics, and Security chapter 11
Thu 29 Apr Penetration Testing
Tue 11 May Course Project Writeup



Copyright 1998, Edward W. Felten.