[CNS 2021] Cryptography and Network Security
Frequently Asked Questions | Course Info | Syllabus | Teaching Team | Readings by week | More Info
This is a portal page.
Please check NTU COOL for the latest and detailed information.
Frequently Asked Questions
Q: How can I enroll?
A: We will announce HW0 during the very first class and distribute the enrollment code based on the HW0 score by the second class. You will have 5 days to finish HW0.
Q: Can I audit?
A: Yes, if you’re an NTU student. No, otherwise. Due to limited TA resources, we won’t grade your homework.
Q: What are the prerequisites?
A: Having basic knowledge in discrete mathematics, programming, and networking is strongly recommended. You're also expected to comprehend research papers and conduct a research project.
- Course number: CSIE 7190
- Location: R101
- Time: 14:20-17:20 (Tue.)
- Website: NTU COOL
SyllabusPlease log in to NTU COOL to access slides and videos.
|1||Feb 23||Course Introduction [pdf]||HW0 due on 2/27|
|2||Mar 02||Security and Crypto Overview||#1|
|3||Mar 09||Cryptographic Hash Functions||#2||HW1 out|
|4||Mar 16||Symmetric Cryptography||#3|
|5||Mar 23||Asymmetric Cryptography||#4|
|6||Mar 30||Key Establishment & Public Key Infrastructure||#5|
|7||Apr 06||Holiday; no class||HW1 due|
|8||Apr 13||Authentication||#6||HW2 out|
|9||Apr 20||Anonymity and Privacy||#7|
|10||Apr 27||Insecurity of TCP/IP, BGP, DNS||#8|
|11||May 04||Transport Layer Security||#9||Proposal due|
|12||May 11||Distributed Denial of Service||#10||HW2 due|
|13||May 18||Exam||HW3 out|
|14||May 25||Selected Topic: IoT and CPS security||#11|
|15||Jun 01||Selected Topic: wireless and ad hoc networks security||#12|
|16||Jun 08||Selected Topic: Software and systems security||#13||HW3 due|
|17||Jun 15||Group Presentation|
|18||Jun 22||Group presentation||Report due on 6/29|
- Email: cns [at] csie.ntu.edu.tw
Readings by week
- N. Gelernter, S. Kalma, B. Magnezi, and H. Porcilan, “The Password Reset MitM Attack,” in IEEE Symposium on Security and Privacy, 2017.
- M. Surbatovich, J. Aljuraidan, L. Bauer, A. Das, and L. Jia, “Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes,” in WWW, 2017.
- J. Karlin et al., “Decoy Routing: Toward Unblockable Internet Communication,” Proc. USENIX Work. Free Open Commun. Internet, 2011.
- A. Juels and R. Rivest. “Honeywords: Making password-cracking detectable,” in ACM CCS, 2013.
- Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, "Mining your Ps and Qs: detection of widespread weak keys in network devices," in USENIX Security symposium, 2012.
- Manuel Egele et al. “An empirical study of cryptographic misuse in android applications.” ACM CCS, 2013.
- Adrian Perrig, Ran Canetti, J. Doug Tygar, Dawn Xiaodong Song. "Efficient authentication and signing of multicast streams over lossy channels." IEEE Symposium on Security and Privacy, 2000.
- A. Narayanan et al., “Location privacy via private proximity testing,” in NDSS, 2011.
- Laurent Eschenauer and Virgil D. Gligor. “A key-management scheme for distributed sensor networks,” in ACM CCS, 2002.
- A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. “The Tangled Web of Password Reuse,” in NDSS, 2014.
- R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” in USENIX Security, 2004.
- K. Butler, T. R. Farley, P. McDaniel, and J. Rexford, “A survey of BGP security issues and solutions,” in Proceedings of the IEEE, 2010.
- An Illustrated Guide to the Kaminsky DNS Vulnerability
- Adrian, David, et al. “Imperfect forward secrecy: How Diffie-Hellman fails in practice.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
- A. Juels and J. Brainard, “Client puzzles: A cryptographic countermeasure against connection depletion attacks,” in NDSS, 1999.
- A. Yaar, A. Perrig, and D. Song, “SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks,” in IEEE S&P, 2004.
- E. Fernandes, J. Jung, and A. Parkash, “Security Analysis of Emerging Smart Home Applications,” in IEEE Symposium on Security and Privacy, 2016.
- Vanhoef, Mathy, and Frank Piessens, “Key reinstallation attacks: Forcing nonce reuse in WPA2,” in ACM CCS, 2017.