An Experience Teaching a Graduate Course in Cryptography

We describe an experience of teaching “Cryptography and Computer Security” in the fall of 1995 at New York University. The class was intended as an introduction for graduate students interested in exploring the historical, theoretical and practical aspects of computer security. Topics covered include classical cryptography, elementary number theory, several security systems, and protocols. The focus on breadth was intentional as the goal of the course was to give students with widely devergent backgrounds exposure to different areas that might interest them. The course content as well as lessons learned and plans for the future are discussed.

[1]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[2]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[3]  Matt Blaze,et al.  The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.

[4]  Moti Yung,et al.  The KryptoKnight family of light-weight protocols for authentication and key distribution , 1995, TNET.

[5]  Matt Blaze,et al.  A cryptographic file system for UNIX , 1993, CCS '93.

[6]  John B. Lacy CryptoLib: Cryptography in Software , 1993, USENIX Security Symposium.

[7]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[8]  Dorothy E. Denning The Clipper Encryption System , 1993 .

[9]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[10]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[11]  Aviel D. Rubin Independent One-Time Passwords , 1996, Comput. Syst..

[12]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[13]  Dan S. Wallach,et al.  Security Flaws in the HotJava Web Browser , 1995 .

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[16]  John Linn,et al.  Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers , 1989, RFC.

[17]  Aviel D. Rubin Trusted distribution of software over the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.

[18]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[19]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[20]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[21]  Paul C. Kocher Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .

[22]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[23]  Peter Honeyman,et al.  Long Running Jobs in an Authenticated Environment , 1993, USENIX Security Symposium.

[24]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[25]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[26]  Ronald L. Rivest,et al.  The RC4 encryption algorithm , 1992 .

[27]  David M. Balenson,et al.  Commercial Key Escrow: Something for Everyone Now and for the Future , 1995 .

[28]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[29]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[30]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.