Lectures in
Secure Networking and Commerce
using Cryptography

(c) Prof. Amir Herzberg (herzbea at cs dot biu dot ac dot il)

Computer Science Department, Bar Ilan University

See also my list of questions (by topic).

 

Please ignore first few administrative foils in the first lectures of each course.

 

Course

Subject / Title of Lecture

-- 0.1 Computer Networking Essentials
Intro to Computer Networks 0.2 Introduction to Network Security: simple introduction to network security and basic cryptography, appropriate as part of networking course.  In power-point and pdf formats.
Intro to Security 0.3 Introduction to secure communication and commerce: threat models and simplified crypto
Intro to Applied Crypto 1

Introduction to cryptography and security: Principles, ciphers, pseudo-randomness, encryption schemes.

2 Hashing, One Way Functions and Commitment
3 Authentication and shared key distribution
4

Public Key Cryptography

5

Public Key Digital Signatures

6

Public Key Infrastructure (PKI)

7

Resiliency to penetrations and exposure (including secret sharing, distributed/threshold and proactive security)

Intro to Secure Communic. and Commerce 9

Web and Transaction Layer Security (TLS & SSL)

10

Internet Layer/Protocol security (IP-sec)

8

Denial-Of-Service and Intrusions Attacks on Hosts and Networks

11 XML & Security
12 Introduction to secure e-commerce, and: Resolving Disputes via Trusted Third Party Protocols (notarization, time-stamping, trusted delivery, certified mail, fair-exchange, contract signing,...)
13

Secure Payments and Banking

14 Secure E-Commerce Applications: Copyright Protection, Voting, Auctions
  15 Epilogue
   

References

COPYRIGHT NOTICE. Copyright 2001-4 by author (Amir Herzberg). Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.  Abstracting with credit is permitted.  To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission from the author.