Instructor: 紀博文 Po-Wen Chi
Email: neokent@gapps.ntnu.edu.tw
Office: 514
Phone: 02-7734-6684
TA: 陳炫豪
Email: fayefayeder@gmail.com
Goals:
Make students be familiar with basic security technologies and how they are applied in the real world.
Provide backgrounds for further studying in cryptography and network security.
Scope:
Cryptographic primitives.
Network and system security in the real world.
William Stallings, Cryptography and Network Security: Principles and Practice (7th Edition).
The most popular information security textbook in Taiwan.
Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography.
This is a good book for entering the crypto world.
Free, unfortunately not completed yet.
Victor Shoup, A Computational Introduction to Number Theory and Algebra.
Free. If you need math backgrounds about cryptography, this is a good book.
N. P. Smart, Cryptography, An Introduction
Free, unfortunately not maintained.
N. P. Smart, Cryptography Made Simple.
A good book but expensive.
But I find a pdf from its publisher.
W. Du, Computer & Internet Security: A Hands-on Approach, Second Edition
A good book for you to experience security in the real world.
Homework: 40%
Writing assignment.
Labs.
Programming.
Midterm: 30%
Final Projects: 30%
Group project. (2-3 members)
You need to prepare a proposal after the midterm.
Select a good paper in 5 years. Some recommendation conferences are as follows:
Crypto, EuroCrypt, AsiaCrypt
PKC: International Conference on Practice and Theory of Public Key Cryptography
FC: Financial Cryptography
TCC: Theory of Cryptography Conference
ACNS: International Conference on Applied Cryptography and Network Security
ISC: The Information Security Conference
USENIX Security Symposium
CCS: ACM Conference on Computer and Communications Security
AsiaCCS: ACM ASIA Conference on Computer and Communications Security
S&P: IEEE Symposium on Security and Privacy
NDSS: ISOC Network and Distributed System Security Symposium
ACSAC: Annual Computer Security Applications Conference
Of course, there are lots of conferences. After you make your decision, please give me a proposal.
HW01
Due: 2020.03.30 PM11:59
HW02
For your reference, client.py
Due: 2020.04.26 PM11:59
HW03
Due: 2020.05.25 PM11:59
HW04
Due: 2020.06.22 PM11:59
Due: 2020.04.21 PM5:30
If you have any questions, please post your questions on the moodle.
Online presentation and do not be late.
Each presentation is 30 minutes, including QA.
Everyone should ask at least one question to the following two talks.
You need to join your presentation session and listen all talks. Of course, if you want to join more sessions, you are welcomed.
You need to submit a report to the moodle
In Chinese.
Use your own words to introduce the paper.
The most important part, your research idea about this topic.
Due: 2020.06.28 PM11:59
OK, I have give you a presentation about this issue. Now I want you to do something.
Citizen Lab writes a report about Zoom Meetings. The link is as follows:
Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings
Frankly speaking, I like this report since it says what they do and what they observe. So do not think that your mistake in your program will not be discovered.
Now I want you to replay this experiment. That is, I want you to do the experiments described in section 4, How we Investigated. Please follow their instructions to do the experiment again and write down your report. Note that Zoom may have already updated their software and therefore, your experiment result may be different with the Citizen Lab. So the version number is very important.
The bonus is 10 points.
Citizen Lab 針對 Zoom 報告的回應: 關於 Zoom 資訊安全的常見疑問與回應
Due: 2020.06.28 PM11:59