| Part 1: Cryptography
|
| Thu Sep 13 |
Message integrity |
|
| Tue Sep 18 |
Pseudorandomness |
|
| Thu Sep 20 |
Stream ciphers and block ciphers |
|
| Thu Sep 25 |
[Buffer] |
|
| Thu Sep 27 |
Asymmetric cryptography |
|
| Tue Oct 2 |
Key exchange |
|
| Thu Oct 4 |
Authenticating people |
|
| Tue Oct 9 |
[Buffer] |
|
| Part 2: Securing systems
|
| Thu Oct 11 |
Public key infrastructure |
|
| Tue Oct 16 |
Operating system security |
|
| Thu Oct 18 |
Hardware and side channels |
|
| Tue Oct 23 |
[Buffer] |
| Thu Oct 25 |
Network security |
|
| Tue Oct 30 |
Fall Recess |
|
| Thu Nov 1 |
Fall Recess |
|
| Tue Nov 6 |
Web security |
|
| Thu Nov 8 |
Vulnerabilities and Malware |
|
| Tue Nov 13 |
[Buffer] |
|
| Part 3: Special topics
|
| Thu Nov 15 |
Privacy |
|
| Tue Nov 20 |
Anonymous communication |
|
| Thu Nov 22 |
Thanksgiving Recess |
|
| Tue Nov 27 |
Cryptocurrencies |
|
| Thu Nov 29 |
Machine learning and security |
|
| Tue Dec 4 |
Fraud and cybercrime |
|
| Thu Dec 6 |
Human factors |
|
| Tue Dec 11 |
Physical security |
|
| Thu Dec 13 |
Economics, law, and policy |
|
| Final exam
|
| Jan TBD |
Time/Location TBD |
|