Friday, February 26, 2010
Lecture 10: Key Exchange (Feb 24th)
Tuesday, February 23, 2010
Lecture 9: Intrusion Prevention Systems, Digital Signatures (Feb 22)
The class started with a presentation on Intrusion Prevention Systems from Justin Bode. Justing began with a funny video that emphasized the need for computer security and privacy in general. The talk started with discussing the need for IPS which flows from the limitations and weaknesses of Anti-viruses, Firewalls and ID systems. Justing then explained how IPS work, covering several methods of intrusion prevention such as heuristic analysis, sandboxing, kernel-based calls interception, etc. Finally, the different types of IPS (network-based, host-based, etc.) were showed and compared according to their strengths and weaknesses.
Dr. Gunes traditionally started the lecture with the review of previous class materials and briefly went through hashing algorithms. Lecture proceeded with the introduction of the topic of Digital Signatures. Digital Signature is an indication of the signer's agreement with contents of an electronic document (similar to signatures on physical documents). The two necessary properties of a digital signature were said to be unforgeability (signer protection) and authenticity (seller protection). Digital signatures are also non-alterable (signed document is non-modifiable without invalidating the signature) and non-reusable (signature is unique to document). An important property of an electronic signature is that it is verifiable by any user.
Some implementation details were given. RSA encryption system was identified to be appropriate to implement a digital signature system. The general mechanism to generate a signature is to pass the message through a redundancy function and encrypt such message with your private key. To verify the signature, one should use your public key to decrypt the message and pass it through a reverse of the redundancy function. Redundancy function must be chosen carefully, as a poor redundancy function can make it easy to forge random signed messages by unauthorized parties.
The method discussed above only provides authenticity, not privacy. To add privacy protection, it is possible to further encrypt the message with a public key of the receiver, so he is the only one who would be able to decrypt it (with his private key).
Friday, February 19, 2010
Lecture 8: Secure Hash Algorithm (Feb 17)
Wednesday, February 17, 2010
Cryptosystem Lab 1
You may post questions or comments under this blog entry.
Note: You may use an external function to test whether a number is a prime number.
Lecture 7: AES & Hash Functions (10 Feb)
Tuesday, February 16, 2010
Colloquium talk
Especially graduate students should plan to attend the talk.
See CSE Colloquia & Symposia page for details
Wednesday, February 10, 2010
Lecture 6: RSA (Feb 8)
Monday, February 8, 2010
Student presentations
Indicate your preferred date and topic on the spread sheet.
Saturday, February 6, 2010
Homework 1
Ch 12, Q 13: The question is asking which of the keys should be used.