CSCE 477/877 Cryptography & Computer Security (Fall 2015)
Syllabus
Instructor:
Class Time:
Location:
Office:
Office Hours:
Email:
Web Page:
TA:
Dr. Qiben Chi-Ben Yan
MWF, 01:30 PM - 02:20 PM
110 Avery Hall
109, Schorr Center
M, W, 2:30PM - 3:30PM, or by a
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Lecture 7: Hash Functions
1
Review: Discrete Logarithm
Compute discrete logarithm is hard.
x (mod p)
Given ,p, to compute x
Security relies on the difficulty of computing disc
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Opera&ng System Security
1
Announcement
Exam 2: Nov. 23 (Monday) in class
close book, close note, 4 ques&ons, 50-minutes
examina&on. One leIer-size ai
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Malware
11/14/15
Malware
1
Viruses, Worms, Trojans, Rootkits
Malware can be classied into several categories, depending
on propagaAon and concealment
CSCE477/877
Cryptography and
Computer Security
Buer Overow A?acks
LimitaCons of Unix Permissions
Unix permissions are not perfect
Groups are restricCve
LimitaCons on le creaCon
Linux opConally uses POSIX A
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Lecture 9: Elliptic Curve Cryptography
Review: Key Management
For secret key cryptography
2
Problem: establishment of shared secret key between Alice
and Bob
Solution: online KDC
CS3235
Introduction to Computer Security
Hugh Anderson
19th November 2003
Preface
The ofcial line:
With the widespread use of computers and Internet as well as electronic commerce,
computer security becomes more and more important. The objective of this m
CSCE 477/877 Cryptography and Computer Security
November 18, 2015
Homework 4
DUE: December 2 (Wednesday), 2015 at 1:30pm
Name_
CSE Login_
Instructions: Follow instructions carefully, failure to do so may result in points
being deducted. Clearly label each
CSCE 477/877 Cryptography and
Computer Security
Final Exam Preparation Guide
Exam date: Dec. 14, 2015 (Monday) Time: 1:00pm~3:50pm
1. The exam will be close book, close note, 110-minutes examination. Two letter-size aid
sheets are allowed. The types of pr
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Lecture 5: RSA
1
Review: Number Theory
Modular arithmetic
GF(p)
Relatively Prime: no common factors other than 1
Finding multiplicative inverse a-1
x has multiplicative inverse mod
CSCE 477/877: Cryptography and
Computer Security
Exam 1
Exam data: Sep. 21, 2015 (Monday)
Time: 1:30pm~2:20pm (in class)
It is close note, close book examination.
Calculator and a one-page aid sheet are allowed.
The exam has totally 5 questions, 6 pages (
CSCE 477/877 Cryptography and
Computer Security
Exam 1 Preparation Guide
Exam date: Sep. 21, 2015 (Monday) Time: 1:30pm~2:20pm (in
class)
1. The exam will be close book, close note, 50-minutes examination. One letter-size aid
sheet is allowed. The types o
CSCE 477/877 Cryptography and Computer Security
October 28, 2015
Homework 3
DUE: November 11, 2015 at 1:30pm
Name_
CSE Login_
Instructions: Follow instructions carefully, failure to do so may result in points
being deducted. Clearly label ea
CSCE 477/877 Cryptography and Computer Security
August 31, 2015
Homework 1
DUE: September 14, 2015
1. Suppose that you want to encrypt a message using an affine cipher. You let a = 0, b =
1, . , z = 25, but you also include ? = 26, ; = 27, =
CSCE 477/877 Cryptography and Computer Security
October 3, 2015
Homework 2
DUE: October 19, 2015 at 1:30pm
Name_
CSE Login_
Instructions: Follow instructions carefully, failure to do so may result in points
being deducted. Clearly label each
CSCE 477/877: Cryptography and Computer
Security
Homework 1 Solution
1.
2.
3.
4.
5.
6.
(1). Shift Cipher: (using frequency analysis)
Plaintext:
There was nothing so VERY remarkable in that nor did Alice think it so VERY much out of the
way to hear the Rab
CSCE 477/877 Cryptography and Computer Security
Project Topic List
You can select topics from the following list or you may come up with
your own topic.
- Research project examples:
Android security, mobile security, Near eld communication (NFC) security
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Lecture 3: Block Cipher Modes of Operation
Modes of Encryption
Encrypting Long Texts
So far we have a block cipher, which encrypts a m-bit block of
plaintext at a time (m=64 fo
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Lecture 6: Digital Signatures and Authentication
Discrete Logarithms
Discrete Logarithms
Given , , p, p is a prime, and are nonzero integers
mod p. Suppose
(mod p)
x
the problem of
CSCE 477/877
Cryptography and Computer Security
Instructor:
Dr. Qiben Yan
Web Security
12/2/15
Web Security
1
Announcement
Project Presenta8on Next Week
HW4 Due: December 2 (1:30pm)
TA will hold a session: December 4, fo