Course - Computer Security MT24
A course on computer security, with a heavy focus on information security.
A lot of the information security topics rely on some foundational assumptions in computational complexity, most strongly that one-way functions exist – i.e. there exist functions $f$ where $f(x)$ is easy to compute but $f^{-1}(x)$ is very difficult to compute. Whether one-way functions exist is actually still an open problem! The existence of one-way functions would imply $\mathbf P = \mathbf{NP}$, so a proof of this fact is expected to be very difficult. Some of [[Course - Quantum Information HT24]]U instead builds up protocols of secure communication founded in quantum theory, whose security is founded in laws of nature rather than hard computational problems.
- Course Webpage
- Lecture Notes
- Andrew Ker’s lecture notes (from 2014, and doesn’t cover all content)
- 1, Introduction
- 2, Access control
- 3, Attacks
- 4, Symmetric-key cryptography
- 5, Hashes
- 6, Asymmetric crypto
- 7, MAC
- 8, Protocols
- 9, Frameworks
- 10, Non-standard authentication
- Other courses this term: [[Courses MT24]]U
Notes
- [[Notes - Computer Security MT24, Basic definitions]]U
- [[Notes - Computer Security MT24, Access control]]U
- [[Notes - Computer Security MT24, Bell-LaPadula model]]U
- [[Notes - Computer Security MT24, Clark-Wilson model]]U
- [[Notes - Computer Security MT24, Access control in UNIX]]U
- [[Notes - Computer Security MT24, Reference monitors]]U
- [[Notes - Computer Security MT24, Attacks]]U
- [[Notes - Computer Security MT24, Symmetric key ciphers]]U
- [[Notes - Computer Security MT24, Block modes]]U
- [[Notes - Computer Security MT24, Cipher attacks]]U
- [[Notes - Computer Security MT24, Stream ciphers]]U
- [[Notes - Computer Security MT24, RC4]]U
- [[Notes - Computer Security MT24, Feistel structures]]U
- [[Notes - Computer Security MT24, DES cryptosystem]]U
- [[Notes - Computer Security MT24, AES cryptosystem]]U
- [[Notes - Computer Security MT24, Cryptographic hashes]]U
- [[Notes - Computer Security MT24, Example hash functions]]U
- [[Notes - Computer Security MT24, Key generation]]U
- [[Notes - Computer Security MT24, Asymmetric key ciphers]]U
- [[Notes - Computer Security MT24, Number theory]]U
- [[Notes - Computer Security MT24, RSA cryptosystem]]U
- [[Notes - Computer Security MT24, Rabin cryptosystem]]U
- [[Notes - Computer Security MT24, Elliptic curve cryptography]]U
- [[Notes - Computer Security MT24, Diffie-Hellman key exchange]]U
- [[Notes - Computer Security MT24, Dolev-Yao model]]U
- [[Notes - Computer Security MT24, MACs]]U
- [[Notes - Computer Security MT24, Digital signatures]]U
- [[Notes - Computer Security MT24, Protocols]]U
- [[Notes - Computer Security MT24, Needham-Schroeder protocol]]U
- [[Notes - Computer Security MT24, Key distribution and mediated authentication]]U
- [[Notes - Computer Security MT24, SSL and TLS]]U
- [[Notes - Computer Security MT24, NIST framework]]U
Problem Sheets
- [[Notes - Computer Security MT24, Problem sheets]]?
- [[Problem Sheet - Computer Security MT24, I]]?
- [[Problem Sheet - Computer Security MT24, II]]?
- [[Problem Sheet - Computer Security MT24, III]]?
- [[Problem Sheet - Computer Security MT24, IV]]?