Instructor: Dr. Ali Aydin Selcuk
Office: EA 428
Telephone: 290-1352
E-mail: selcuk@cs.bilkent.edu.tr
Office hour: Friday 10:40-11:30 or by appointment
Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman, and M. Speciner. Prentice-Hall
Supplementary Books:
- Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd
Edition. B. Schneier. John Wiley & Sons.
- Cryptography : Theory and Practice. D. Stinson. CRC Press.
- Handbook of Applied
Cryptography. A. Menezes, P. van Oorschot and S. Vanstone. CRC Press.
Syllabus:
(pdf)
Traditional cryptosystems
Block ciphers
Stream ciphers
Hash functions
Public key encryption
Digital signatures
Threshold cryptography
Key management
Authentication systems
Kerberos
IPsec
SSL/TLS
E-mail security
Selected topics
Rijndael, Joan Daemen, Vincent Rijmen
Differential Cryptanalysis of DES-like Cryptosystems, Eli Biham, Adi Shamir
Linear Cryptanalysis of DES Cipher, Mitsuri Matsui
Intercepting Mobile Communications: The Insecurity of 802.11, Nikita Borisov, Ian Goldberg, David Wagner
Basic Number Theory Fact Sheet I, Fact Sheet II, Dan Boneh
FAQ About Today's Cryptography, RSA Labs
Mozilla's Root CA Policy, Mozilla Wiki
Root CA Policies of Systems and Browsers, Andreas Arnold
The Inconvenient Truth about Web Certificates, Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler, Jean-Pierre Hubaux
Crytography and the Internet, Steve M. Bellovin
Problem Areas for the IP Security Protocols, Steve M. Bellovin
TLS, Wikipedia
SSL And The Future Of Authenticity, Moxie Marlinspike
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties, Jari Arkko, Pekka Nikander
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software, Martin Georgiev et al.