Information for Spring 00 CS239---Security for Networks and System Software

This page contains pointers to Postscript versions of slides used in CS239, Lecture 2(Security for Networks and System Software). It also contains pointers to papers that students should read for this class, reading assignments from the textbook, and other material related to the class. This page is organized by the weeks of the quarter in which lectures were given and papers assigned. The weeks are in inverse order, on the assumption you will most often be looking for the most recent week.

This class will be taught by Peter Reiher

The textbook for the class is Security in Computing, by Charles Pfleeger.

I will be lecturing on these subjects during the class. This list also shows the reading assignments in Pfleeger. Since I'm choosing them as we go along, the research papers I am assigning are not listed here, but are listed below with the lecture slides.

Week 9 (May 29 - June 2)

May 31

Slides:

Lecture 16

May 31

No class, Memorial Day holiday.

Week 8 (May 22 - May 26)

May 24

Slides:

Lecture 15

Reading Assignment:

Pfleeger: Chapter 6, Chapters 7.1-7.3. Since this is a bigger reading assignment than usual, no paper is assigned this week.

May 22

Slides:

Lecture 14

Reading Assignment:

Pfleeger: Chapter 9.5, 9.6, 10.3, 10.4, 10.5

Week 7 (May 15 - May 19)

May 17

Slides:

Lecture 13

Reading Assignment:

Pfleeger: Chapter 5.1, 5.2

May 15

Slides:

Lecture 12

Paper: The Evolution of the Kerberos Authentication System, J. Kohl, B. Neuman, and T. T'so, in Distributed Open Systems, Morgan Kauffman Publishers, 1994.

Week 6 (May 8 - May 12)

May 10

Slides:

Lecture 11

Paper: RFC 1825: Security Architecture for the Internet Protocol , R. Atkinson.

Optional papers (neither of these is required, but they will give you more detailed information on IPSEC, if you are especially interested):

RFC 1826: IP Authentication Header , R. Atkinson.

RFC 1827: IP Encapsulating Security Payload (ESP) , R. Atkinson.

There are a few broken links on all these papers, since I copied the web pages to a local machine and didn't fiddle the links. None of the broken links relates to information in the papers, however, just to links to other web pages at the original site.

Week 5 (May 1 - May 5)

May 8

Slides:

Lecture 10

Week 5 (May 1 - May 5)

May 3

Slides:

Lecture 9

Week 4 (April 24 - April 28)

April 26

Slides:

Lecture 8

April 24

Slides:

Lecture 7

Reading Assignment:

Pfleeger: Chapter 4.1, 4.2 pp. 126-153, 4.3-4.7

Week 3 (April 17 - April 21)

April 19

Slides:

Lecture 6

Reading Assignment:

Pfleeger, Chapter 3.10

Paper: The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption , Abelson, et. al.

Optional paper: A report on the legal status of cryptography internationally from the Electronic Privacy Information Center. You will not be tested on this report, but it provides a good summary of what is going on with the law and cryptography worldwide, and may be of interest to you.

April 17

Slides:

Lecture 5

Reading Assignment:

Chapter 3.1, 3.3-3.9 (not responsible for detailed description of sections 3.4, 3.5, 3.9)

Week 2 (April 10 - April 14)

April 12

Slides:

Lecture 4

Reading Assignment:

NIST Report on Candidates for New Data Encryption Standard (Note: The purpose of assigning the paper is to give you a more detailed view of key issues in designing and evaluating cryptographic algorithms. Also, one of these five algorithms will become very important very soon.)

April 10

Slides:

Lecture 3

Reading Assignment:

None (based on last week's assignment)

Week 1 (April 3 - April 7)

Slides:

Lecture 2

Reading Assignment:

Chapters 2.1-2.4 and 2.6-2.9 of Pfleeger.

Lecture 1

Reading Assignment:

Chapter 1 of Pfleeger.