Class mailing list
To sign up for the class mailing list, please go here . Please
use an email address that you read daily.
- Some notes on getting your blog set up with Blogger and MovableType are here.
is a list of topics for
the second presentation. You are welcome to come up with your own
topic; keep in mind that it must cover a controversial issue, and you
must take and depend a point of view.
Here is a list of potential
presentation topics. Feel free to come up with your own as well. Come
talk to me if you're not sure whether a topics is suitable.
Here is the example talk I cave on Carnivore on 2/4/04.
Here is the example talk I cave on Zero Information Protocols on 2/11/04.
- An introduction to PGP and
public-key encryption. Lots of information on how public-key and
PKI systems work. Not much detail on why public-key encryption is
- RSA faq -
more technical detail on generating keys.
- In particular, RSA labs has a
very nice explanation of the difficulty of
factoring large numbers, using Moore's Law to estimate future security.
brief explanation of the mathematics of RSA, including an example.
- distributed.net An online
community devoted to developing massively distributed applications for
breaking cryptographic protocols, including DES and RC5.
of online resources about cryptography and security.
- the International PGP homepage.
white paper from Sun that provides a nice overview of PKI.
collection of links about Public Key Infrastructure.
- A fun
paper by Fagin, Naor, and Winkler on zero-information protocols.
paper describing the implementation of RC5.
Intellectual Property, Copyright, Patent, Fair Use