Login
فهرست دروس پاسخ به سوالات OCW معرفي پيشنهادات
  MIT » فاز 1: مجموعه دروس منتخب » دکتر حمیدرضا ناجی » خواندنی‌ها
خواندنی‌ها  


خواندني‌ها


ستون خواندني‌هاي زير خواندني‌هاي مربوط به کتاب درسي را شامل مي‌شود.

Smart, N. Cryptography: An Introduction. New York, NY: McGraw-Hill, 2002,
ISBN: 077099877

شماره درس

عناوين

خواندني‌ها

خواندني‌هاي اختياري

1

مقدمه

   

Whitten, Alma, Tygar, J.D. "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0." Proceedings of the 8th USENIX Security Symposium, August 23-36, 1999, Washington, D.C.

Fu, et al. "Dos and Don’ts of Client Authentication on the Web." MIT Technical Report 818, 2001. (PDF)

Kohno, et al. "Analysis of an Electronic Voting System." (PDF)

2

بررسي تصديق اصالت كاربر، كلمات عبور، هشينگ

Section 1 0.3

Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC press, October, 1996, pp. 321-327. ISBN: 0849385237. Reprinted (5th printing) in August 2001. [Hash functions and MACs].

Neumann, Peter G. "Risks of Passwords." Communications of the ACM 37, 4 (April 1994). New York, USA: ACM Press, 1994, pp. 126.

Evans, Arthur, Jr., William Kantrowitz, and Edwin Weiss. "A User Authentication Scheme not Requiring Secrecy in the Computer." Communications of the ACM 17, no. 8 (August 1974). New York, USA: ACM Press, 1974, pp. 437-442.

FIPS Standard for Password Usage

Sit, Emil, and Kevin Fu. "Inside Risks: Web Cookies: Not Just a Privacy Risk." Communications of the ACM 44, no. 9 (September 2001). New York, USA: ACM Press, 2001, pp. 120.

3

توابع هش

   

Secure Hash Standard

"Collision in part of MD5 (the compression function." RSA Laboratories' CryptoBytes newsletter, Volume 2, Number 2, Summer 1996. (PDF)

Tripwire

HMAC Papers

Fu, et al. "A file system using Merkle's hash trees for integrity." ACM Transactions on Computer Systems. Volume 20, Issue 1, 2002, pp. 1 - 24.

4

كاربردهاي بيشتر هشينگ، امنيت غير شرطي

Chapter 4

Lamport, Leslie. "One-Time Passwords: Password Authentication with Insecure Communication." Communications of the ACM 24, no. 11 (November 1981). New York, USA: ACM Press, 1981, pp. 770 - 772.

NSA VENONA Project

Hash cash (Adam Back)

One-time passwords

5

امنيت غير شرطي

  

A worked one-time-pad decryption (by your TA's) (PDF)

RSA Laboratories | Cryptography FAQ | What is a stream cipher? (Contains information on one-time pads.)

National Security Agency's pages on Venona (Successful decryption of one-time pads that were reused.)

RFC 1750: Randomness Recommendations for Security

6

رمزهاي بلوكي، مدهاي عمليات

Chapter 5

AES/Rijndael

Slides on the relative speed of hardware implementations of AES finalists and DES, 3DES (PDF)

NIST: Modes of Operation for Block Ciphers

7

مقدمه اي بر تئوري اعداد رمز نگاري

Chapters 1 and 8

Notes on number theory (very rough draft) (PDF)

 

8

بزرگترين مقدمه عليه مشترك و معكوس‌هاي مدولار، توليد كننده‌ها، لگاريتم‌هاي مجزا، تبادل كليد ديفي هلمن، رمز نگاري و امضاهاي الگامال

Chapter 7

Diffie, Whitfield, and Martin Hellman. "New Directions in Cryptography.

9

RSA ، حمله‌هاي متن رمز انتخاب شده RSA-OAEP

Sections 10.1 and 10.2

For PS 4: Paillier and Pointcheval. "Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries."

For PS 4: Know Your Enemy: Sebek2 (PDF)

Rivest, R. L., A. Shamir, and L. Adleman. "A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Communications of the ACM 21, no. 2 (February 1978): 120-126.

Cramer and Shoup. "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack."

History and multiple drafts of Ralph Merkle's paper, Secure Communications over Insecure Channels, which was finally printed in the Communications of the ACM of April 1978 (pp. 294-299), but which was written in 1974.

OAEP

RSA Labs OAEP FAQ

10

كرامر شوپ، طرح‌هاي تعهد

Section 13.2

  

11

كوئير 1

  

  

12

توافق كليد

Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. "Key Establishment Protocols." Chapter 12 in Handbook of Applied Cryptography. CRC press, October, 1996, pp. 321-327. ISBN: 0849385237. Reprinted (5th printing) in August 2001.

Section 10.7

Mao, Wenbo, and Colin Boyd. "Towards Formal Analysis of Security Protocols." 1993.

Mao, Wenbo, and Colin Boyd. "Classification of Cryptographic Techniques in Authentication Protocols." 1994.

13

و اشتراك رمزIBE, IBS, SSL

Section 12.6

Boneh, D., and D. Brumley. "Remote Timing Attacks Are Practical." Usenix security, 2003. (PDF)

Wagner, D., and B. Schneier. "Analysis of the SSL 3.0protocol." Usenix Workshop on electronic commerce, 1996.

Identity-Based Encryption

14

اشتراک رمز

   

Shamir. "How to Share A Secret."

Krawczyk. "Secret Sharing Made Short."

15

دانش صفر

Section 13.3

  

16

اثر انگشت و نشانه گذاري

  

Boneh, Dan, and James Shaw. "Collusion-Secure Fingerprinting for Digital Data." IEEE Transactions on Information Theory. Vol 44, No. 5, 1998. pp. 1897-1905.

17

مقاومت تبانگر و مناظره ديسك

 

Anderson, Ross, and Markus Kuhn. "Tamper Resistance --- A Cautionary Note."

Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Introduction to Differential Power Analysis and Related Attacks." (PDF)

Garfinkel, Simson, and Abhi Shelat. "Remembrance of Data Passed: A Study of Disk Sanitization Practices." IEEE Computer Society, January/February 2003. (PDF)

18

امنيت فيزيكي، توابع غير قابل نسخه‌برداري فيزيكي، TMPEST

Kuhn, Markus, and Ross Anderson. "Soft Tempest." From Aucsmith, D. (Ed.) Information Hiding. Springer-Ve lag Berlin Heidelberg, 1998, pp. 124-142. (PDF)

Kuhn, Markus. "Optical Time-Domain Eavesdropping Risks of CRT Displays." Proceedings 2002 IEEE Symposium on Security and Privacy, 12–15 May 2002, Berkeley, California, pp. 3–18. (PDF)

FAQ on "Optical Time-Domain Eavesdropping Risks of CRT Displays."

Devadas, Srini, et al. "Silicon PUFs."

Devadas, Srini, et al. "Controlled PUFs."

Pappu, et al. "Physical One-Way Functions." Science. Volume 297, September 2002, pp. 2026-2030. (PDF)

  

19

برنامه‌هاي خود رجوعي، ويروس‌ها، حمله‌هاي سرريزي باخر

Slammed! (Story of Slammer worm)

Cowan, et al. "StackGuard."

Chess, David and Steve White. "An undetectable computer virus." (PDF)

Staniford, S., et al. "How to 0wn the Internet in Your Spare Time." Proceedings of the 11th USENIX Security Symposium, 2002.

  

20

مطالب بيشتر در مورد ويروس‌ها

Chess, David and Steve White. "An undetectable computer virus." (PDF)

Thompson, Ken. "Reflections on Trusting Trust." CACM 27, no.8 (August 1984): 761-763.

Nazario, Jose, et al. "The Future of Internet Worms." (PDF)

21

محاسبات مورد اعتماد (NGSCB نگه‌دار، TCPA)

Garfinkel, T., et al. "Flexible OS Support and Applications for Trusted Computing." (PDF)

Trusted Computing Group

Microsoft's Palladium FAQ

Ross Anderson's TCPA/Palladium FAQ

22

محاسبات مورد اعتماد، امنيت جاوا، بيومتريك‌ها

 

United States General Accounting Office (GAO). "Technology Assessment: Using Biometrics in Border security." (PDF) Report No. GAO-03-174, November 2002.

Cryptogram Newsletter from August 1998 that mentions biometrics

Pankanti, S., et al. "On the Individuality of Fingerprints." (PDF)

23

كوئيز 2، ملاحظات پاياني

 

 

24

بحث‌ها

  

 

25

بحث‌ها

 

 

26

بحث‌ها

 

 

دکتر حمید‌رضا ناجی  
 
  Massachusetts Institute of Technology © 2005 MIT    حفظ اطلاعات شخصي    نكات حقوقي