[CNS 2021] Cryptography and Network Security

Frequently Asked Questions | Course Info | Syllabus | Teaching Team | Readings by week | More Info

This is a portal page.
Please check NTU COOL for the latest and detailed information.

Last updated on 2021/02/22

Frequently Asked Questions

Q: How can I enroll?
A: We will announce HW0 during the very first class and distribute the enrollment code based on the HW0 score by the second class. You will have 5 days to finish HW0.

You may check out last year's introduction to get a sense of this course and HW0, but note that this year's HW0 may be different from last year's. [last year's pdf] [last year's video]

Q: Can I audit?
A: Yes, if you’re an NTU student. No, otherwise. Due to limited TA resources, we won’t grade your homework.

Q: What are the prerequisites?
A: Having basic knowledge in discrete mathematics, programming, and networking is strongly recommended. You're also expected to comprehend research papers and conduct a research project.

Course Info


Please log in to NTU COOL to access slides and videos.
Wk. Date Topic Reading HW
1 Feb 23 Course Introduction [pdf] HW0 due on 2/27
2 Mar 02 Security and Crypto Overview #1
3 Mar 09 Cryptographic Hash Functions #2 HW1 out
4 Mar 16 Symmetric Cryptography #3
5 Mar 23 Asymmetric Cryptography #4
6 Mar 30 Key Establishment & Public Key Infrastructure #5
7 Apr 06 Holiday; no class HW1 due
8 Apr 13 Authentication #6 HW2 out
9 Apr 20 Anonymity and Privacy #7
10 Apr 27 Insecurity of TCP/IP, BGP, DNS #8
11 May 04 Transport Layer Security #9 Proposal due
12 May 11 Distributed Denial of Service #10 HW2 due
13 May 18 Exam HW3 out
14 May 25 Selected Topic: IoT and CPS security #11
15 Jun 01 Selected Topic: wireless and ad hoc networks security #12
16 Jun 08 Selected Topic: Software and systems security #13 HW3 due
17 Jun 15 Group Presentation
18 Jun 22 Group presentation Report due on 6/29

Teaching Team

TA Office Hour Location
王秉倫 Wed. 14:00-15:00 R307
梁友銓 Tue. 13:00-14:00 R307
劉恩婷 Thu. 18:15-19:15 R307
朱玟嶧 Fri. 13:00-14:00 R307
許育銘 Mon. 15:00-16:00 地下室大四區

Readings by week

    • N. Gelernter, S. Kalma, B. Magnezi, and H. Porcilan, “The Password Reset MitM Attack,” in IEEE Symposium on Security and Privacy, 2017.
    • M. Surbatovich, J. Aljuraidan, L. Bauer, A. Das, and L. Jia, “Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes,” in WWW, 2017.
    • J. Karlin et al., “Decoy Routing: Toward Unblockable Internet Communication,” Proc. USENIX Work. Free Open Commun. Internet, 2011.
    • A. Juels and R. Rivest. “Honeywords: Making password-cracking detectable,” in ACM CCS, 2013.
    • Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, "Mining your Ps and Qs: detection of widespread weak keys in network devices," in USENIX Security symposium, 2012.
    • Manuel Egele et al. “An empirical study of cryptographic misuse in android applications.” ACM CCS, 2013.
    • Adrian Perrig, Ran Canetti, J. Doug Tygar, Dawn Xiaodong Song. "Efficient authentication and signing of multicast streams over lossy channels." IEEE Symposium on Security and Privacy, 2000.
    • A. Narayanan et al., “Location privacy via private proximity testing,” in NDSS, 2011.
    • Laurent Eschenauer and Virgil D. Gligor. “A key-management scheme for distributed sensor networks,” in ACM CCS, 2002.
    • A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. “The Tangled Web of Password Reuse,” in NDSS, 2014.
    • R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” in USENIX Security, 2004.
    • Adrian, David, et al. “Imperfect forward secrecy: How Diffie-Hellman fails in practice.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
    • A. Juels and J. Brainard, “Client puzzles: A cryptographic countermeasure against connection depletion attacks,” in NDSS, 1999.
    • A. Yaar, A. Perrig, and D. Song, “SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks,” in IEEE S&P, 2004.
    • E. Fernandes, J. Jung, and A. Parkash, “Security Analysis of Emerging Smart Home Applications,” in IEEE Symposium on Security and Privacy, 2016.
    • Vanhoef, Mathy, and Frank Piessens, “Key reinstallation attacks: Forcing nonce reuse in WPA2,” in ACM CCS, 2017.

More Info