| Part 1: Cryptography
|
| Tue Jan 31 |
Course intro & policies; Message integrity |
|
| Thu Feb 2 |
Pseudorandomness |
|
| Tue Feb 7 |
Stream ciphers and block ciphers |
|
| Thu Feb 9 |
[Buffer] |
|
| Tue Feb 14 |
Asymmetric cryptography |
|
| Thu Feb 16 |
Key exchange |
|
| Tue Feb 21 |
Authenticating people |
|
| Thu Feb 23 |
[Buffer] |
|
| Part 2: Securing systems
|
| Tue Feb 28 |
Public key infrastructure |
|
| Thu Mar 2 |
Operating system security |
|
| Tue Mar 7 |
Hardware and side channels |
|
| Thu Mar 9 |
[Buffer] |
| Tue Mar 14 |
Spring Recess |
|
| Thu Mar 16 |
Spring Recess |
|
| Tue Mar 21 |
Network security |
|
| Thu Mar 23 |
Web security |
|
| Tue Mar 28 |
Vulnerabilities and Malware |
|
| Thu Mar 30 |
[Buffer] |
|
| Part 3: Special topics
|
| Tue Apr 4 |
Privacy |
|
| Thu Apr 6 |
Anonymous communication |
|
| Tue Apr 11 |
Cryptocurrencies |
|
| Thu Apr 13 |
Machine learning and security |
|
| Tue Apr 18 |
Machine learning and security |
|
| Thu Apr 20 |
Fraud and cybercrime |
|
| Tue Apr 25 |
Human factors |
|
| Thu Apr 27 |
Physical security |
|
| Final exam
|
| Mon May 15 |
7:30pm Friend 101 |
|