Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=== Theory === | === Theory === | ||
− | [http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] | + | *[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] |
− | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February === | + | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February 2007 === |
*[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | *[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | ||
:-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)] | :-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)] | ||
*[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | *[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | ||
− | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February === | + | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February 2007 === |
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | *[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | ||
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | *[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | ||
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | *[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | ||
+ | |||
+ | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] 31 March 2007 === | ||
+ | *[http://www.mobilefish.com/developer/bouncycastle/bouncycastle.html Bouncy Castle tutorial] | ||
+ | *[http://dev2dev.bea.com/pub/a/2006/08/pfx-pem-certificate-formats.html Tutorial, extracting keys from .pfx certificate] | ||
+ | |||
+ | Required Java Classes are found in <code>java.security</code> and <code>java.security.cert</code>, could not find <code>cipher</code> |
Latest revision as of 22:47, 19 March 2007
Contents
Theory
Homework 1: 8 February 13 February 2007
Homework 2: 28 February 2007
Project 1 31 March 2007
Required Java Classes are found in java.security
and java.security.cert
, could not find cipher