[CNS 2023] Cryptography and Network Security

Frequently Asked Questions | Course Info | Syllabus | Teaching Team | Readings by week | More Info

This is a portal page.
Please check NTU COOL for the latest and detailed information.

Last updated on 2023/03/07.

Frequently Asked Questions

Q: How can I enroll?
A: We will announce HW0 during the very first class and distribute the enrollment code based on the HW0 score by the second class. You will have a week to finish HW0.

You may check out last year's introduction to get a sense of this course and HW0, but note that this year's HW0 may be different from last year's. [last year's webpage]

Q: Can I audit?
A: Yes, if you're an NTU student. No, otherwise. Due to limited TA resources, we won't grade your homework.

Q: What are the prerequisites?
A: Having basic knowledge in discrete mathematics, programming, and networking is strongly recommended. You're also expected to comprehend research papers and conduct a research project.

Course Info

Syllabus

Please log in to NTU COOL to access slides and videos.
Wk. Date Topic Reading HW
1 Feb 20 Course Introduction [pdf] HW0 due on 02/27 23:59
2 Feb 27 No Class (National Holiday) #1 Reading #1 = HW0
3 Mar 06 Security and Crypto Overview HW1 out
4 Mar 13 Randomness Generation, Cryptographic Hash Functions
5 Mar 20 Symmetric Cryptography #2
6 Mar 27 Asymmetric Cryptography #3
7 Apr 03 [Pre-recorded] Key Management (Spring Break)
8 Apr 10 Authentication #4 HW1 due; HW2 out
9 Apr 17 Anonymity and Privacy #5
10 Apr 24 Internet Insecurity
11 May 01 Transport Layer Security #6 Proposal due
12 May 08 DDoS Attack and Defense #7
13 May 15 Exam HW2 due; HW3 out
14 May 22 Advanced Topics #8
15 May 29 Advanced Topics
16 Jun 05 Group Presentation
17 Jun 12 Group Presentation HW3 due
18 Jun 19 No Class Report due

Teaching Team

TA Office Hour Location
蔡奇夆 (lead TA) Mon 13:20-14:20 地下室中柱
陳正康 Tue 17:30-18:30 地下室中柱
周楷翔 Fri 18:00-19:00 地下室中柱
林郁敏 Wed 14:00-15:00 電機系博理館地下室
李安傑 Thu 13:30-14:30 地下室中柱

Readings by week

    • Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. The tangled web of password reuse. In NDSS, 2014.
    • Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, and Michael Bailey. Users really do plug in USB drives they find. In IEEE Symposium on Security and Privacy, 2016.
    • A. Juels and R. Rivest. Honeywords: Making password-cracking detectable. In ACM CCS, 2013.
    • Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In ACM CCS, 2009.
    • Ken Thompson. Reflections on trusting trust. Commun. ACM 27, 8, 761‒ 763, Aug 1984.
    • mma Dauterman, Vivian Fang, Natacha Crooks, and Raluca Ada Popa. Reflections on trusting distributed trust. In Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022.

More Info