Download COM 260 Syllabus

Project: Cryptosystems

Chapter 1: Introduction

Chapter 2: Crypto Basics
Caesar Cipher
RailFence Cipher
Route Cipher
Read chapter 2:
             • How to Speak Crypto
             • Classic Cryptography
             • Modern Crypto History
             • A Taxonomy of Cryptography
             • A Taxonomy of Cryptanalysis
Assignment: Endcrypt Decrypt

Chapter 3: Symmetric Key Crypto
Read chapter 3:
             • Stream Ciphers
             • Block Ciphers
             • Integrity
Chapter 4: Public Key Cryptography
Read chapter 4:
             • Knapsack
             • RSA
             • Diffie-Hellman
             • Elliptic Curve Cryptography
             • Public Key Notation, Uses and Infrastructure
Assignment: Diffie / RSA

Chapter 5: HASH Functions
Read chapter 5:
             • A Birthday Attack
             • Non-Cryptographic Hashes
             • Tiger Hash
             • HMAC
Chapter 7: Access Control: Authentication
Chapter 8: Access Control: Authorization
OSI Model: Open Systems Interconnection
Chapter 9: Simple Authentication Protocols
Read chapter 9:
             • Simple Security Protocols
             • Authentication Protocols
             • Authentication and TCP
             • Zero Knowledge Proofs
             • The Best Authentication Protocol?
Chapter 10: Real-world Security Protocols
Read chapter 10:
             • SSH, SSL, IPSec, Kerberos, WEP, GSM
Chapter 11: Software Flaws and Malware
Read chapter 11:
            • Software Flaws
            • Malware (virus, worm, Trojan horse, trapdoor, rabbit, Spyware)
            • Botnets
            • Miscellaneous Software-Based Attacks
Chapter 12: Insecurity in Software
Read chapter 12:
            • Software Reverse Engineering
            • Digital Rights Management
            • Software Development
Chapter 13: Operating Systems and Security
Read chapter 13:
            • OS Security Functions
            • Trusted Operating System
            • Next Generation Secure Computing Base

By Arfaoui