Course Introduction Yuzhe Tang.

Slides:



Advertisements
Similar presentations
Jongwook Woo CIS 100 Business Computer Systems (Syllabus) Jongwook Woo, PhD California State University, LA Computer and Information.
Advertisements

CIS 528 Introduction to Big Data Computing and Analysis
Designing an Effective Course Curriculum Ponnurangam K (“PK”) Indo-US Workshop on Effective Teaching at College / University Level Feb 10, 2011.
CS 201: Introduction To Programming With Java
CSIS-385: Analysis of Algorithms Dr. Eric Breimer.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
COMP 14 – 02: Introduction to Programming Andrew Leaver-Fay August 31, 2005 Monday/Wednesday 3-4:15 pm Peabody 217 Friday 3-3:50pm Peabody 217.
Project Management Take a Tour of the Online Course.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
COP4020/CGS5426 Programming languages Syllabus. Instructor Xin Yuan Office: 168 LOV Office hours: T, H 10:00am – 11:30am Class website:
Networked Systems Practicum Lecture 1 – Introduction 1.
Introduction to Programming Summer 2010 Akil M. Merchant.
EECE 310 Software Engineering Lecture 0: Course Orientation.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Course Introduction Software Engineering
EEL4712 Digital Design. Instructor Dr. Greg Stitt Office Hours: TBD (Benton 323) Also, by appointment.
IT Project Management MIS 492/592, Fall 2013 CIS 1013.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Course Information Andy Wang Operating Systems COP 4610 / CGS 5765.
Jongwook Woo CIS 520 Software Engineering (Syllabus) Jongwook Woo, PhD California State University, LA Computer and Information System.
Jongwook Woo CIS 528 Introduction to Big Data Science (Syllabus) Jongwook Woo, PhD California State University, LA Computer and Information.
CS Welcome to CS 5383, Topics in Software Assurance, Toward Zero-defect Programming Spring 2007.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
CIT 592 Discrete Math Lecture 1. By way of introduction … Arvind Bhusnurmath There are no bonus points for pronouncing my last name correctly Please call.
Jongwook Woo Computer Information Systems CIS 528 Introduction to Big Data Computing and Analysis (Syllabus) Jongwook Woo, PhD California.
Networking CS 3470, Section 1 Sarah Diesburg
Computer Network Fundamentals CNT4007C
Welcome to CS 4390/CS5381: Introduction to Formal Methods
Course Overview - Database Systems
IT Project Management MIS419/576 Fall 2017.
Andy Wang Object Oriented Programming in C++ COP 3330
Course Information and Introductions
Principles of Computer Security
Course Information and Introductions
Course Introduction 공학대학원 데이타베이스
COMP 283 Discrete Structures
Introduction to Programming
CIS5930 Software Defined Networking
Introduction to Information Security
Introduction to Information Security
Computer Organization II
MIS323 Business Telecommunications
Course Information Mark Stanovich Principles of Operating Systems
Welcome to the a Department of Engineering Education !
CS 3343: Analysis of Algorithms
Course Information and Introductions
Course Overview - Database Systems
Welcome to CS 1340! Computing for scientists.
Andy Wang Operating Systems COP 4610 / CGS 5765
Andy Wang Object Oriented Programming in C++ COP 3330
Computer Systems Security
Andy Wang Operating Systems COP 4610 / CGS 5765
Andy Wang Operating Systems COP 4610 / CGS 5765
CNT 4704 Analysis of Computer Communication Networks
Andy Wang Operating Systems COP 4610 / CGS 5765
MIS323 Business Telecommunications
COMS 261 Computer Science I
Andy Wang Operating Systems COP 4610 / CGS 5765
CIS5930: Advanced Topics in Parallel and Distributed Systems
Analysis of Algorithms
C Programming Lecture 1 : Introduction
Welcome to Physics 5305!!.
CIS5930 Interconnection Networks
Andy Wang Operating Systems COP 4610 / CGS 5765
Information Retrieval CIS-462
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
CS201 – Course Expectations
CS2013 LECTURE 1 John Hurley Cal State LA.
Presentation transcript:

Course Introduction Yuzhe Tang

Administrivia Instructor Course website: Dr. Yuzhe (Richard) Tang Office: 4-193, Sci-Tech Building ytang100@syr.edu Course website: http://tristartom.github.io/teaching/17s-cis600/

Teaching Goal Train future cryptographic engineer (and scientist) From Syllabus [link] Difference to ‘Intro to crypto’. We are not interested in construction!!

Why should you take this course? Unfilled cyber-security jobs Cryptology is used in many companies Security applications: Password, remote user-login, Secure transactions, Encrypted disk,

Course structure Prerequisite: Topics (from syllabus): Knowledge (or interest) in cryptography Knowledge in programming (C/Java), systems, basic math. Topics (from syllabus):

Course structure Class participation (10%) Exercises/Programming projects/Presentations (50%) Exams (40%)

Class participation & exercises Before the class Read the related chapter in textbook Course schedule here: http://tristartom.github.io/teaching/17s-cis600/ Schedule of next week will be fixed every Thursday this week. During the class Actively answer questions Do exercises After the class Do homework

Presentation and projects Four topics of your choice Cryptographic games (EasyCrypt) TEE and TPM (using Intel SGX) Blockchain and Bitcoin (using Ethereum) Password and authentication (cracking Linux crypt()) For each topic chosen, you should 1. Present a paper in the class; see paper choice in website 2. Do the programming project of the topic For each topic, you will need to self-study but I will Give lectures introducing the basics. See website. Provide programming guidance.

Honor Code Syracuse University has an Academic Integrity Policy Read it! (http://academicintegrity.syr.edu/academic-integrity-policy/) Violations WILL be reported! Grading based on your own work Do NOT allow ANYONE see your work Do NOT try to look at ANYONE’s work ANYONE includes other students, friends, family, resources from the Internet, etc. Work includes code snippet, hw solutions, etc Penalties for cheating are high Best-case scenario: lose a letter grade Worst-case scenario: expelled from the University Don’t take chance! Cheating WILL be detected. JUST DON’T CHEAT!

Introduce yourself Name, Program, Discipline, etc. What you want to learn from the course More on security application or formal treatment Your current expertise on cryptography Understanding on semantic security, RSA, AES, CR-Hash, etc? What crypto library used before? Send me (ytang100@syr.edu) an email about this after the class. Thanks!