Computer and Network Security
CS494/594     Class 15 12/5/06
Topics
crypto in society
review
lecture
slides
take-home
Final Exam
Required reading
text
Why Cryptography Is Harder Than It Looks
sci.crypt's
FAQ
the
quantum computer
Additional reading
the psychology of security
The Hackers are Coming!
trends (12/05) and SANS
top 20 attack targets
crypto law
search and seizure of computers
NRC's
Cryptography's Role in Securing the Information Society
eff
electronic frontier foundation, privacy
evote study
SERVE and more on
electronic voting
CISP
Cardholder Information Security Program
spyware
RSA's
cryptography FAQ
Anderson's
Why Cryptosystems Fail
being a cryptographer
identity theft
or
here
or
here
Esoteric
Breaking DES Using a Molecular Computer
and
DNA computing
Shor's
Algorithms for Quantum Computation
discrete logs and factoring
MIT/Stanford
quantum computing
or
qubit.org
HERF
and
TEMPEST links
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
pdf
TEMPEST for Eliza
play MP3 through your monitor to your radio
echelon
attacks on USB tokens
as always, cruise the
security page
Last revised 10/17/04
Back to
lectures
or
class home page