| Part 1: Cryptography
|
| Tue Jan 25 |
Course intro & policies; Message integrity |
|
| Thu Jan 27 |
Pseudorandomness |
|
| Tue Feb 1 |
Stream ciphers and block ciphers |
|
| Thu Feb 3 |
[Buffer] |
|
| Tue Feb 8 |
Asymmetric cryptography |
|
| Thu Feb 10 |
Key exchange |
|
| Tue Feb 15 |
Authenticating people |
|
| Thu Feb 17 |
[Buffer] |
|
| Part 2: Securing systems
|
| Tue Feb 22 |
Public key infrastructure |
|
| Thu Feb 24 |
Operating system security |
|
| Tue Mar 1 |
Hardware and side channels |
|
| Thu Mar 3 |
[Buffer] |
| Tue Mar 8 |
Spring Recess |
|
| Thu Mar 10 |
Spring Recess |
|
| Tue Mar 15 |
Network security |
|
| Thu Mar 17 |
Web security |
|
| Tue Mar 22 |
Vulnerabilities and Malware |
|
| Thu Mar 24 |
[Buffer] |
|
| Part 3: Special topics
|
| Tue Mar 29 |
Privacy |
|
| Thu Mar 31 |
Anonymous communication |
|
| Tue Apr 5 |
Cryptocurrencies |
|
| Thu Apr 7 |
Machine learning and security |
|
| Tue Apr 12 |
Machine learning and security |
|
| Thu Apr 14 |
Fraud and cybercrime |
|
| Tue Apr 19 |
Human factors |
|
| Thu Apr 21 |
Physical security |
|
| Final exam
|
| May TBD |
Time/Location TBD |
|