Difference between revisions of "CSE539 Applied Cryptography"

From esoterum.org
Jump to: navigation, search
 
(2 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
*[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984]
 
*[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984]
  
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February ===
+
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February 2007 ===
 
*[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine]
 
*[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine]
 
:-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)]
 
:-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)]
 
*[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]
 
*[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]
  
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February ===
+
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February 2007 ===
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses]
 
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses]
  
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] ===
+
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] 31 March 2007 ===
 +
*[http://www.mobilefish.com/developer/bouncycastle/bouncycastle.html Bouncy Castle tutorial]
 +
*[http://dev2dev.bea.com/pub/a/2006/08/pfx-pem-certificate-formats.html Tutorial, extracting keys from .pfx certificate]
 +
 
 +
Required Java Classes are found in <code>java.security</code> and <code>java.security.cert</code>, could not find <code>cipher</code>

Latest revision as of 23:47, 19 March 2007

Theory

Homework 1: 8 February 13 February 2007

-Flash Enigma emulator (Germany)

Homework 2: 28 February 2007

Project 1 31 March 2007

Required Java Classes are found in java.security and java.security.cert, could not find cipher