Information for Spring 00 CS239---Security for Networks and System Software
This page contains pointers to Postscript versions of slides used
in CS239, Lecture 2(Security for Networks and System Software). It also contains
pointers to papers that students should read for this class, reading
assignments from the textbook, and other material related to the class.
This page is organized by the weeks of the quarter in which lectures were
given and papers assigned. The weeks are in inverse order, on the
assumption you will most often be looking for the most recent week.
This class will be taught by Peter Reiher
The textbook for the class is Security in Computing,
by Charles Pfleeger.
I will be lecturing on
these subjects during the class. This list also shows the reading
assignments in Pfleeger. Since I'm choosing them as we
go along, the research papers I am assigning are not listed here, but
are listed below with the lecture slides.
Week 9 (May 29 - June 2)
May 31
Slides:
Lecture 16
May 31
No class, Memorial Day holiday.
Week 8 (May 22 - May 26)
May 24
Slides:
Lecture 15
Reading Assignment:
Pfleeger: Chapter 6, Chapters 7.1-7.3. Since this is a bigger reading
assignment than usual, no paper is assigned this week.
May 22
Slides:
Lecture 14
Reading Assignment:
Pfleeger: Chapter 9.5, 9.6, 10.3, 10.4, 10.5
Week 7 (May 15 - May 19)
May 17
Slides:
Lecture 13
Reading Assignment:
Pfleeger: Chapter 5.1, 5.2
May 15
Slides:
Lecture 12
Paper: The Evolution of the Kerberos Authentication System,
J. Kohl, B. Neuman, and T. T'so, in Distributed Open Systems, Morgan Kauffman
Publishers, 1994.
Week 6 (May 8 - May 12)
May 10
Slides:
Lecture 11
Paper: RFC 1825: Security Architecture for the Internet Protocol ,
R. Atkinson.
Optional papers (neither of these is required, but they will give you more
detailed information on IPSEC, if you are especially interested):
RFC 1826: IP Authentication Header , R. Atkinson.
RFC 1827: IP Encapsulating Security Payload (ESP) , R. Atkinson.
There are a few broken links on all these papers, since I copied the web
pages to a local machine and didn't fiddle the links. None of the broken
links relates to information in the papers, however, just to links to other
web pages at the original site.
Week 5 (May 1 - May 5)
May 8
Slides:
Lecture 10
Week 5 (May 1 - May 5)
May 3
Slides:
Lecture 9
Week 4 (April 24 - April 28)
April 26
Slides:
Lecture 8
April 24
Slides:
Lecture 7
Reading Assignment:
Pfleeger: Chapter 4.1, 4.2 pp. 126-153, 4.3-4.7
Week 3 (April 17 - April 21)
April 19
Slides:
Lecture 6
Reading Assignment:
Pfleeger, Chapter 3.10
Paper: The Risks of Key Recovery, Key
Escrow, and Trusted Third-Party Encryption , Abelson, et. al.
Optional paper: A
report on the legal status of cryptography internationally from the
Electronic Privacy Information Center. You will not be tested on this
report, but it provides a good summary of what is going on with the
law and cryptography worldwide, and may be of interest to you.
April 17
Slides:
Lecture 5
Reading Assignment:
Chapter 3.1, 3.3-3.9 (not responsible for detailed description of sections 3.4, 3.5, 3.9)
Week 2 (April 10 - April 14)
April 12
Slides:
Lecture 4
Reading Assignment:
NIST Report
on Candidates for New Data Encryption Standard (Note: The purpose of
assigning the paper is to give you a more
detailed view of key issues in designing and evaluating cryptographic
algorithms. Also, one of these five algorithms will become very important
very soon.)
April 10
Slides:
Lecture 3
Reading Assignment:
None (based on last week's assignment)
Week 1 (April 3 - April 7)
Slides:
Lecture 2
Reading Assignment:
Chapters 2.1-2.4 and 2.6-2.9 of Pfleeger.
Lecture 1
Reading Assignment:
Chapter 1 of Pfleeger.