Course - Computer Security MT24
A course on computer security, with a heavy focus on information security.
A lot of the information security topics rely on some foundational assumptions in computational complexity, most strongly that one-way functions exist – i.e. there exist functions $f$ where $f(x)$ is easy to compute but $f^{-1}(x)$ is very difficult to compute. Whether one-way functions exist is actually still an open problem! The existence of one-way functions would imply $\mathbf P = \mathbf{NP}$, so a proof of this fact is expected to be very difficult. Some of Course - Quantum Information HT24U instead builds up protocols of secure communication founded in quantum theory, whose security is founded in laws of nature rather than hard computational problems.
- Course Webpage
- Lecture Notes
- Andrew Ker’s lecture notes (from 2014, and doesn’t cover all content)
- 1, Introduction
- 2, Access control
- 3, Attacks
- 4, Symmetric-key cryptography
- 5, Hashes
- 6, Asymmetric crypto
- 7, MAC
- 8, Protocols
- 9, Frameworks
- 10, Non-standard authentication
- Other courses this term: Courses MT24U
Notes
- Notes - Computer Security MT24, Basic definitionsU
- Notes - Computer Security MT24, Access controlU
- Notes - Computer Security MT24, Bell-LaPadula modelU
- Notes - Computer Security MT24, Clark-Wilson modelU
- Notes - Computer Security MT24, Access control in UNIXU
- Notes - Computer Security MT24, Reference monitorsU
- Notes - Computer Security MT24, AttacksU
- Notes - Computer Security MT24, Symmetric key ciphersU
- Notes - Computer Security MT24, Block modesU
- Notes - Computer Security MT24, Cryptographic attack modelsU
- Notes - Computer Security MT24, Stream ciphersU
- Notes - Computer Security MT24, RC4U
- Notes - Computer Security MT24, Feistel structuresU
- Notes - Computer Security MT24, DESU
- Notes - Computer Security MT24, AES cryptosystemU
- Notes - Computer Security MT24, Cryptographic hashesU
- Notes - Computer Security MT24, LM hashU
- Notes - Computer Security MT24, Key generationU
- Notes - Computer Secuirty MT24, Asymmetric key ciphersU
- Notes - Computer Security MT24, Number theoryU
- Notes - Computer Security MT24, RSAU
- Notes - Computer Security MT24, Rabin cryptosystemU
- Notes - Computer Security MT24, Elliptic curve cryptographyU
- Notes - Computer Security MT24, Diffie-Hellman key exchangeU
- Notes - Computer Security MT24, Dolev-Yao modelU
- Notes - Computer Security MT24, MACsU
- Notes - Computer Security MT24, Digital signaturesU
- Notes - Computer Security MT24, ProtocolsU
- Notes - Computer Security MT24, Needham-Schroeder protocolU
- Notes - Computer Security MT24, Key distributionU
- Notes - Computer Security MT24, SSL and TLSU
- Notes - Computer Security MT24, FrameworksU