Course - Computer Security MT24


A Part A/Part B course on computer security, with a heavy focus on information security.

A lot of the information security topics rely on some foundational assumptions in computational complexity, most strongly that one-way functions exist – i.e. there exist functions $f$ where $f(x)$ is easy to compute but $f^{-1}(x)$ is very difficult to compute. Whether one-way functions exist is actually still an open problem! The existence of one-way functions would imply $\mathbf P = \mathbf{NP}$, so a proof of this fact is expected to be very difficult. Some of [[Course - Quantum Information HT24]]U instead builds up protocols of secure communication founded in quantum theory, whose security is founded in laws of nature rather than hard computational problems.

Timetable

  • Monday 11AM-12PM, Weeks 1,2,3,4,5,7 (lecture)
  • Wednesday 11AM-12PM, Weeks 1,2,3,4,5,7 (lecture)
  • Friday 11AM-12PM, Weeks 1-4 (lecture)
  • Monday 10AM-11AM, Weekly 4,5,7,8 (class)

Notes

Problem Sheets

To-do List

Covering slides

  • 1. Introduction
  • 2. Access control
    • Negative permissions
    • Policy conflict and conflict resolution
    • Privileges and roles, role based access control
    • Requirements of reference monitor security
  • 3. Attacks
    • Drive-by-downloads
    • Ransomware as denying data not service
    • Double extortion
    • Buffer overflow example
    • Code injection SQL example
    • Command injection PHP example
  • 4. Symmetric key crypto
    • Details of AES
    • Other problems with ECB (repeats $\approx \sqrt{2^k}$, re-order blocks)
    • Images for block modes
  • 5. Hashes
    • Stretched and salted passwords
    • Details of LM hash
    • scrypt, forcing attacker to use memory as well as time
    • Hash function requirements for different use cases
    • Details of MD4
    • Details of SHA3
    • RC4
  • 6. Asymmetric key ciphers
    • Elliptic-curve cryptography
  • 7. MACs and digital signatures
    • Combining confidentiality and integrity with one key using Galois Counter Mode
    • Signature padding
    • PKCS#1 v1.5 signature padding
    • RSA-PSS
  • 8. Protocols
    • More details about certificates, like their actual content
    • Abstract protocol based on certificates
    • BEAST attack on SSL/TLS
    • Blockwise adaptive CPAs
    • “Prudent engineering principles for cryptoprotocol design”
  • 9. Frameworks
    • NIST Framework



Related posts