[CNS 2023] Cryptography and Network Security
Frequently Asked Questions | Course Info | Syllabus | Teaching Team | Readings by week | More Info
This is a portal page.
Please check NTU COOL for the latest and detailed information.
Frequently Asked Questions
Q: How can I enroll?
A: We will announce HW0 during the very first class and distribute the enrollment code based on the HW0 score by the second class. You will have a week to finish HW0.
Q: Can I audit?
A: Yes, if you're an NTU student. No, otherwise. Due to limited TA resources, we won't grade your homework.
Q: What are the prerequisites?
A: Having basic knowledge in discrete mathematics, programming, and networking is strongly recommended. You're also expected to comprehend research papers and conduct a research project.
Course Info
- Course number: CSIE 7190
- Location: R107
- Time: 14:20-17:20 (Mon.)
- Website: NTU COOL
Syllabus
Please log in to NTU COOL to access slides and videos.Wk. | Date | Topic | Reading | HW |
---|---|---|---|---|
1 | Feb 20 | Course Introduction [pdf] | HW0 due on 02/27 23:59 | |
2 | Feb 27 | No Class (National Holiday) | #1 | Reading #1 = HW0 |
3 | Mar 06 | Security and Crypto Overview | HW1 out | |
4 | Mar 13 | Randomness Generation, Cryptographic Hash Functions | ||
5 | Mar 20 | Symmetric Cryptography | #2 | |
6 | Mar 27 | Asymmetric Cryptography | #3 | |
7 | Apr 03 | [Pre-recorded] Key Management (Spring Break) | ||
8 | Apr 10 | Authentication | #4 | HW1 due; HW2 out |
9 | Apr 17 | Anonymity and Privacy | #5 | |
10 | Apr 24 | Internet Insecurity | ||
11 | May 01 | Transport Layer Security | #6 | Proposal due |
12 | May 08 | DDoS Attack and Defense | #7 | |
13 | May 15 | Exam | HW2 due; HW3 out | |
14 | May 22 | Advanced Topics | #8 | |
15 | May 29 | Advanced Topics | ||
16 | Jun 05 | Group Presentation | ||
17 | Jun 12 | Group Presentation | HW3 due | |
18 | Jun 19 | No Class | Report due |
Teaching Team
- Email: cns [at] csie.ntu.edu.tw
TA | Office Hour | Location |
---|---|---|
蔡奇夆 (lead TA) | Mon 13:20-14:20 | 地下室中柱 |
陳正康 | Tue 17:30-18:30 | 地下室中柱 |
周楷翔 | Fri 18:00-19:00 | 地下室中柱 |
林郁敏 | Wed 14:00-15:00 | 電機系博理館地下室 |
李安傑 | Thu 13:30-14:30 | 地下室中柱 |
Readings by week
- Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. The tangled web of password reuse. In NDSS, 2014.
- Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, and Michael Bailey. Users really do plug in USB drives they find. In IEEE Symposium on Security and Privacy, 2016.
- A. Juels and R. Rivest. Honeywords: Making password-cracking detectable. In ACM CCS, 2013.
- Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In ACM CCS, 2009.
- Ken Thompson. Reflections on trusting trust. Commun. ACM 27, 8, 761‒ 763, Aug 1984.
- mma Dauterman, Vivian Fang, Natacha Crooks, and Raluca Ada Popa. Reflections on trusting distributed trust. In Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022.