DaemonForums  

Go Back   DaemonForums > DaemonForums.org > News

News News regarding BSD and related.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 8th March 2012
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 3,889
Thanked 214 Times in 189 Posts
Default Stanford University -- Free online Introduction to Cryptography course

This class was announced many months ago, and is just now getting underway. There are approximately 50,000 online students who pre-registered.

I am taking the class, because while we all use software tools that apply cryptographic technology, I wanted an understanding of the primitives and underlying methodologies. I thought it might be fun, too.

I'm about 2/3rds of the way through the Week 1 lectures. So far, for example, I have learned how Bletchley Park managed to decrypt Enigma rotor ciphers (a brute force ciphertext attack), what the security problems were in the NNTP protocol design in the Windows NT era (a one-time-pad actually used twice, permitting ciphertext to be decrypted with nothing more than an XOR), and the many problems incurred in WEP design (exploiting three weaknesses in the RC4 PRG as implemented in the WEP stream cipher).

I've also learned how DVD video CSS encryption works, and how its 17 and 25 bit registers are used in key generation, and how the encryption was broken using message knowledge (MPEG-2 structure).

I have learned to prove that OTP is "perfectly secure" -- but that the ciphertext is malleable and subject to precise data injection by an attack in transit.

I never studied discrete probability, so the terminology and associated notation describing probability analysis in large sets has been a little confusing, though I am able to comprehend the lemmas and proofs.

If you have any interest, you may take a look here.
Reply With Quote
  #2   (View Single Post)  
Old 12th March 2012
Carpetsmoker's Avatar
Carpetsmoker Carpetsmoker is offline
Real Name: Martin
Old man from scene 24
 
Join Date: Apr 2008
Location: Eindhoven, Netherlands
Posts: 2,088
Thanked 198 Times in 156 Posts
Default

This looks pretty interesting! Thanks for sharing.
__________________
UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things.
Reply With Quote
  #3   (View Single Post)  
Old 12th March 2012
Carpetsmoker's Avatar
Carpetsmoker Carpetsmoker is offline
Real Name: Martin
Old man from scene 24
 
Join Date: Apr 2008
Location: Eindhoven, Netherlands
Posts: 2,088
Thanked 198 Times in 156 Posts
Default

One of the first slides uses IE6! Yikes!
__________________
UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things.
Reply With Quote
  #4   (View Single Post)  
Old 12th March 2012
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 3,889
Thanked 214 Times in 189 Posts
Default

Yeah, it's just a screenshot of a browser image used in on slide 4 of the introductory lecture. Not germane to the discussion, but it does indicate that not every slide gets revised every semester.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Cryptography community/forum? guitarscn Off-Topic 15 4th September 2014 12:06 PM
Successful timing attacks on elliptic curve cryptography J65nko News 1 26th May 2011 07:34 PM
Introduction plus SSH login hang question. pico OpenBSD General 7 2nd April 2010 06:08 AM
Designing BSD Rootkits: An Introduction to Kernel Hacking cajunman4life Book reviews 2 21st June 2008 03:27 PM
Semi-brief introduction to file permissions, BSDfan666 Guides 4 7th June 2008 02:38 PM


All times are GMT. The time now is 10:29 PM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick