EECS 498 -- Computer Security and Trustworthy Computing

Winter 2005

Lecture handouts
  • Crypto Background - block ciphers
  • Crypto Background -- Tradeoffs among block encryption modes for providing confidentiality
  • Crypto Background -- RC4, performance comparison, hashing, HMAC
  • Public keys and Digital signatures
  • Projects

    Homeworks for the discussion

    Schedule


    Monday Tuesday Wednesday Thursday Friday

    11:30-12






    12-12:30






    12:30-1






    1-1:30






    1:30-2






    2-2:30






    2:30-3






    3-3:30 Lecture. 2305 GGBL


    Office hours. Sam King.
    Media Union
    Lecture. 2305 GGBL


    Office hours. Prakash.
    2231 EECS
    Discussion. 2305 GGBL


    3:30-4

    4-4:30




    4:30-5
    Office hours. Prakash
    2231 EECS

    Office Hours. Prakash.
    2231 EECS.




    5-5:30







    5:30-6







    6-6:30







    6:30-7







    7-7:30







    7:30-8







    Class newsgroup

    We will be using an open source web-based system, phorum, for class communication. It is available
    at http://phorum.eecs.umich.edu. If you are signed up for the course, you will automatically have access.

    Documents and resources

    Instructors

    Prakash's picture
    Atul Prakash
    2225 EECS

    Sam King
    3rd floor Media Union