Network Security Theory and Practice

College of Computer Science and Technology, Zhejiang University, Spring 2019
Monday 15:55 – 17:30, Tuesday 14:05 - 15:40, Room CW-104
Tuesday 15:55 – 17:30, Room CW-503

Schedule

Week 01  
 
 
 
 
 
 
 
 
 
 
2019.02.25/2019.02.26  

 
 
 
 
 
 
 
 
 
Lecture 01: Course Introduction

Lecture 02: Cryptography
 
 
 
 
 
 
 
 
 | #The Security Mindset by Bruce Schneier
 | #The Internet: Cybersecurity & Crime by Parisa Tabriz and Jenny Martin
 | #The Internet: Encryption & Public Keys by Mia Epner
 | #Data Encryption Standard (DES)
 | #The Wonderful World of Elliptic Curve Cryptography by Bill Buchanan OBE
 | #Elliptic Curve Integrated Encryption Scheme (ECIES) by Bill Buchanan OBE
 | #Elliptic Curve Cryptography Overview by John Wagnon
 | #A Survey on Homomorphic Encryption Schemes: Theory and Implementation by A. Acar et al.
 | #Proxy Re-encryption by David Vassallo
 | #Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage by G. Ateniese et al.
 | Due: Project Grouping
Week 02  
 
2019.03.04/2019.03.05  
 
Lecture 03: Cryptanalysis
 
 | #Cryptanalysis by Sourav Mukhopadhyay
 | Due: Proposal Presentation
Week 03  
 
 
 
 
2019.03.11/2019.03.12  
 
 
 
 
Lecture 04: Blockchain
 
 
 
 
 | #The Rise and Rise of Bitcoin
 | #How the Bitcoin Protocol Actually Works by Michael Nielsen
 | #Bitcoin: A Peer-to-Peer Electronic Cash System by Satoshi Nakamoto
 | #51% Attack Explained by Bisade Asolo
 | #Bitcoin and Cryptocurrency Technologies Online Course
Week 04  
 
 
2019.03.18/2019.03.19  
 
 
Lecture 05: Secure Connection
 
 
 | #SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements by J. Clark and P. Oorschot
 | #SSL and HTTPS by Nickolai Zeldovich
 | #Everything About HTTPS and SSL (Java) by Akhil Raj
Week 05  
 
 
 
2019.03.25/2019.03.26  
 
 
 
Lecture 06: Secure Routing and Forwarding
 
 
 
 | #The Internet: Packets, Routing & Reliability by Lynn Root and Vint Cerf
 | #BGP Hijack Explained by Jorge Ribas
 | #Why Is It Taking So Long to Secure Internet Routing? by Sharon Goldberg
 | #FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking
Week 06  
 
2019.04.01/2019.04.02  
 
Lecture 07: Anonymous Communication
 
 | #Anonymous Communication by Nick Mathewson
 | #Tor: The Second-Generation Onion Router (2012 DRAFT) by Dingledine et al.
Week 07  
 
 
 
 
2019.04.08/2019.04.09  
 
 
 
 
Lecture 08: Wi-Fi Security
 
 
 
 
 | #WiFi Security by Nick Kartsioukas
 | #How does WPA and WPA2 Work?
 | #Top Ten Wi-Fi Security Threats by Lisa Phifer
 | #Wireless Attacks Unleashed by Chintan Gurjar
 | Assignment Due April 15
Week 08  
 
 
 
 
 
2019.04.15/2019.04.16  
 
 
 
 
 
Lecture 09: Zero-Knowledge Proof
Lecture 10: Course Review
 
 
 
 
 | Due: Wrapup Presentation
 | Due: Demo
 | Report Due: April 23
 | #The 3 Secrets of Highly Successful Graduates by Reid Hoffman
 | #Wish You Well
 | #See You