[CNS 2021] Cryptography and Network Security
Frequently Asked Questions | Course Info | Syllabus | Teaching Team | Readings by week | More Info
This is a portal page.
Please check NTU COOL for the latest and detailed information.
Frequently Asked Questions
Q: How can I enroll?
A: We will announce HW0 during the very first class and distribute the enrollment code based on the HW0 score by the second class. You will have 5 days to finish HW0.
Q: Can I audit?
A: Yes, if you’re an NTU student. No, otherwise. Due to limited TA resources, we won’t grade your homework.
Q: What are the prerequisites?
A: Having basic knowledge in discrete mathematics, programming, and networking is strongly recommended. You're also expected to comprehend research papers and conduct a research project.
Course Info
- Course number: CSIE 7190
- Location: R101
- Time: 14:20-17:20 (Tue.)
- Website: NTU COOL
Syllabus
Please log in to NTU COOL to access slides and videos.Wk. | Date | Topic | Reading | HW |
---|---|---|---|---|
1 | Feb 23 | Course Introduction [pdf] | HW0 due on 2/27 | |
2 | Mar 02 | Security and Crypto Overview | #1 | |
3 | Mar 09 | Cryptographic Hash Functions | #2 | HW1 out |
4 | Mar 16 | Symmetric Cryptography | #3 | |
5 | Mar 23 | Asymmetric Cryptography | #4 | |
6 | Mar 30 | Key Establishment & Public Key Infrastructure | #5 | |
7 | Apr 06 | Holiday; no class | HW1 due | |
8 | Apr 13 | Authentication | #6 | HW2 out |
9 | Apr 20 | Anonymity and Privacy | #7 | |
10 | Apr 27 | Insecurity of TCP/IP, BGP, DNS | #8 | |
11 | May 04 | [online] Transport Layer Security | #9 | Proposal due |
12 | May 11 | [online] Review and Project Discussion | #10 | HW2 due |
13 | May 18 | [online] Exam | HW3 out | |
14 | May 25 | [online] DDoS, IoT security | ||
15 | Jun 01 | [online] Smart Contract Security | #11 | |
16 | Jun 08 | [online] Randomness Generation, summary | #12 | |
17 | Jun 15 | [online] Group Presentation | #13 | |
18 | Jun 22 | [online] Group presentation | HW3 due; Report due on 6/29 |
Teaching Team
- Email: cns [at] csie.ntu.edu.tw
TA | Office Hour | Location |
---|---|---|
王秉倫 | Wed. 14:00-15:00 | R307 |
梁友銓 | Tue. 13:00-14:00 | R307 |
劉恩婷 | Thu. 17:00-18:00 | R307 |
朱玟嶧 | Fri. 13:00-14:00 | R307 |
許育銘 | Mon. 15:00-16:00 | 地下室大四區 |
Readings by week
- N. Gelernter, S. Kalma, B. Magnezi, and H. Porcilan, “The Password Reset MitM Attack,” in IEEE Symposium on Security and Privacy, 2017.
- M. Surbatovich, J. Aljuraidan, L. Bauer, A. Das, and L. Jia, “Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes,” in WWW, 2017.
- J. Karlin et al., “Decoy Routing: Toward Unblockable Internet Communication,” Proc. USENIX Work. Free Open Commun. Internet, 2011.
- A. Juels and R. Rivest. “Honeywords: Making password-cracking detectable,” in ACM CCS, 2013.
- Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, "Mining your Ps and Qs: detection of widespread weak keys in network devices," in USENIX Security symposium, 2012.
- Manuel Egele et al. “An empirical study of cryptographic misuse in android applications.” ACM CCS, 2013.
- Adrian Perrig, Ran Canetti, J. Doug Tygar, Dawn Xiaodong Song. "Efficient authentication and signing of multicast streams over lossy channels." IEEE Symposium on Security and Privacy, 2000.
- A. Narayanan et al., “Location privacy via private proximity testing,” in NDSS, 2011.
- Laurent Eschenauer and Virgil D. Gligor. “A key-management scheme for distributed sensor networks,” in ACM CCS, 2002.
- A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. “The Tangled Web of Password Reuse,” in NDSS, 2014.
- R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” in USENIX Security, 2004.
- K. Butler, T. R. Farley, P. McDaniel, and J. Rexford, “A survey of BGP security issues and solutions,” in Proceedings of the IEEE, 2010.
- An Illustrated Guide to the Kaminsky DNS Vulnerability
- Adrian, David, et al. “Imperfect forward secrecy: How Diffie-Hellman fails in practice.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
- A. Juels and J. Brainard, “Client puzzles: A cryptographic countermeasure against connection depletion attacks,” in NDSS, 1999.
- A. Yaar, A. Perrig, and D. Song, “SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks,” in IEEE S&P, 2004.
- E. Fernandes, J. Jung, and A. Parkash, “Security Analysis of Emerging Smart Home Applications,” in IEEE Symposium on Security and Privacy, 2016.
- Vanhoef, Mathy, and Frank Piessens, “Key reinstallation attacks: Forcing nonce reuse in WPA2,” in ACM CCS, 2017.