CSL 7490: Introduction to Blockchain
Introduction to Blockchain [5 Lectures]: Digital Trust, Asset, Transactions, Distributed Ledger Technology, Types of network, Components of blockchain (cryptography, ledgers, consensus, smart contracts).
PKI and Cryptography [6 Lectures]: Private keys, Public keys, Hashing, Digital Signature.
Consensus [6 Lectures]: Byzantine Fault, Proof of Work, Proof of Stake.
Cryptocurrency [10 Lectures]: Bitcoin creation and economy, Limited Supply and Deflation, Hacks, Ethereum concept and Ethereum classic.
Hyperledger Fabric [8 Lectures]: Hyperledger Architecture, Membership, Blockchain, Transaction, Chaincode, Hyperledger Fabric, Features of Hyperledger, Fabric Demo.
Blockchain Applications [6 Lectures]: Building on the Blockchain, Ethereum Interaction - Smart Contract and Token (Fungible, non-fungible), Languages, Blockchain-as-a-service.
Textbook:
A. Bahga, V. Madisetti (2017), Blockchain Applications: A Hands-On Approach, VPT.
Self Learning Material:
M. Swan (2015), Blockchain: Blueprint for a New Economy, O’Reilly Media.
R. Wattenhofer (2016), The Science of the Blockchain, CreateSpace Independent Publishing Platform.
I. Bashir (2017), Mastering blockchain, Packt Publishing Ltd.
K. E. Levy, Book-smart, Not Street-smart: Blockchain-based Smart Contracts and the Social Workings of Law, Engaging Science, Technology, and Society, Vol. 3, pp. 1-15,2017.
Preparatory Course Material:
MIT Online Blockchain Course, Learn Blockchain Technology: https://getsmarter.mit.edu/
CSL 6010: Cybersecurity
Introduction and Motivation: Challenges and constraints, Cyber threats. (2 Lectures)
Cyber Security Vulnerabilities and Cyber Security Safeguards: Cyber security, Vulnerabilities, safeguards, Access control, Authentication, Biometrics, Deception, Denial of Service Filters, Ethical hacking, Firewalls, Response, Scanning, Security policy, Threat management. (8 Lectures)
Cryptography: Shannon’s Approach to Cryptography: Measures of security, Perfect secrecy, Definition of entropy, One-time pad, Symmetric Key Cryptography, Cryptographic Hash Functions, Authentication, Public Key Cryptosystems, Key Distribution and Key Agreement Protocols( 4 Lectures )
Secure Protocol Design: Authentication and Key-Exchange Protocols, Security Properties in Protocols, Case study on TLS, Wireless Protocols (4 Lectures)
Securing Web Application, Services and Servers: Basic security for HTTP applications and services, Basic security for SOAP services, Identity management and Web services, Authorization patterns, Security considerations, challenges. (4 Lectures)
Network Security: TCP/IP threats, the IPSEC protocol, the SSL and TLS protocols, Firewalls and Virtual Private Networks (VPNs), Electronic mail security, Worms, DDoS attacks, BGB, and security considerations (12 lectures)
Recent Trends/Special Topics: Blockchain (4 Lectures)
Cyber Forensics: Handling preliminary investigations, Controlling an investigation, Conducting disk-based analysis, Investigating information-hiding, Tracing internet access, Tracing memory in real-time. (4 Lectures)
Textbook:
Stallings, W. (2017). Cryptography and Network Security, Pearson Education India.
Boyd, Colin, Anish Mathuria, and Douglas Stebila. Protocols for authentication and key establishment
Self Learning Material:
Douglas R. Stinson, Maura B. Paterson (2018). Cryptography: theory and practice.4/E Chapman and Hall/CRC
P.W. SINGER, A. FRIEDMAN (2014), Cybersecurity: What Everyone Needs to Know,OUP, 1st Edition.