[10344] in cryptography@c2.net mail archive
available draft chapters and lectures on `secure communication and commerce using crypto`
daemon@ATHENA.MIT.EDU (Amir Herzberg)
Fri Feb 1 13:34:51 2002
Reply-To: <amir@beesites.co.il>
From: "Amir Herzberg" <amir@newgenpay.com>
To: <cryptography@wasabisystems.com>
Date: Thu, 31 Jan 2002 16:41:53 +0200
Message-ID: <001c01c1aa65$6dc17ba0$323cfea9@newgenpay>
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_001D_01C1AA76.314A4BA0"
This is a multi-part message in MIME format.
------=_NextPart_000_001D_01C1AA76.314A4BA0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Hi all,=20
=20
As you may already know, I'm working on a text-book, to be published by
Prentice Hall, titled: Introduction to Secure Communication and Commerce
Using Cryptography.=20
=20
Lectures covering much of the material, and a fair number of draft
chapters, are now available online; see (link from)
http://amir.beesites.co.il/book.html. I've recently added to the site
few more lectures (payments, voting, trust,=85) and the chapter on
micropayments. Still a long way to go, but I think it may already
provide some value.=20
=20
You are encouraged to use the presentations and draft-chapters from that
site (you'll find the chapters under `Notes` column). The material is
copyrighted but you can use it for personal use and study, and
definitely encouraged to use to give courses; please inform me of any
non-personal use. My goal is to create a textbook which can be used for
introductory courses in cryptography, secure communication and secure
commerce & payments (for undergrads and graduates).=20
=20
I appreciate your feedback and suggestions, in particular, please let me
know if there are other areas you think I should cover.=20
=20
Enclosed is the current table of contents (most subject already contain
lecture and/or draft/partial chapters =96 others marked TBD):=20
=20
1. Introduction
2. Security threats and requirements
3. Principles of Modern Cryptography
4. Cryptography I: encryption and randomness
5. Cryptography II: Hashing and Message Authentication (MAC)
6. Cryptography III: Public Key Cryptography
7. Cryptography IV: distributed and proactive cryptography (and secret
sharing) [TBD]=20
8. PKI and certificates=20
9. Secure Communication I: network reliability and security (TCP/IP,
firewalls, tunneling, denial of service)=20
10. Secure Communication II: Authentication, Authorization and Key
Distribution=20
11. Secure Communication III: IP layer security (IPSec, IKE)=20
12. Secure Communication IV: transport layer security =96 SSL, TLS, WTLS
and WEP=20
13. Secure XML=20
14. Security, Trust and Reputation=20
15. Secure e-Banking and accounts [TBD]=20
16. Secure Payments I: overview, credit card payments, mobile payments=20
17. Secure Payments II: micropayments, money transfer
18. Privacy and anonymity: digital cash, anonymous communication [TBD]=20
19. Content Protection and Security for Remote Code=20
20. Trusted third party services =96 Notary, e-vault, secure agents =
[TBD]=20
21. Advanced protocols =96 voting, gambling, =85=20
22. Conclusion and social/legal issues [TBD]
=20
Cheers,=20
=20
Amir Herzberg
=20
------=_NextPart_000_001D_01C1AA76.314A4BA0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:p=3D"urn:schemas-microsoft-com:office:powerpoint" =
xmlns:oa=3D"urn:schemas-microsoft-com:office:activation" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 10">
<meta name=3DOriginator content=3D"Microsoft Word 10">
<link rel=3DFile-List href=3D"cid:filelist.xml@01C1AA76.302CF4C0">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
name=3D"PersonName"/>
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:DoNotRelyOnCSS/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:DocumentKind>DocumentEmail</w:DocumentKind>
<w:EnvelopeVis/>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
</w:WordDocument>
</xml><![endif]--><!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin:0cm;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{color:purple;
text-decoration:underline;
text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
{margin:0cm;
margin-bottom:.0001pt;
text-align:right;
mso-pagination:widow-orphan;
direction:rtl;
unicode-bidi:embed;
font-size:12.0pt;
font-family:"Times New Roman";
mso-fareast-font-family:"Times New Roman";}
p
{mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-fareast-font-family:"Times New Roman";}
span.EmailStyle17
{mso-style-type:personal-compose;
mso-style-noshow:yes;
mso-ansi-font-size:10.0pt;
mso-bidi-font-size:10.0pt;
font-family:Arial;
mso-ascii-font-family:Arial;
mso-hansi-font-family:Arial;
mso-bidi-font-family:Arial;
color:windowtext;}
@page Section1
{size:595.3pt 841.9pt;
margin:72.0pt 90.0pt 72.0pt 90.0pt;
mso-header-margin:35.4pt;
mso-footer-margin:35.4pt;
mso-paper-source:0;}
div.Section1
{page:Section1;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */=20
table.MsoNormalTable
{mso-style-name:"\05D8\05D1\05DC\05D4 \05E8\05D2\05D9\05DC\05D4";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman";}
</style>
<![endif]-->
</head>
<body lang=3DEN-US link=3Dblue vlink=3Dpurple =
style=3D'tab-interval:36.0pt'>
<div class=3DSection1>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Hi all, =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>As you may
already know, I'm working on a text-book, to be published by Prentice =
Hall,
titled: Introduction to Secure Communication and Commerce Using =
Cryptography. <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Lectures
covering much of the material, and a fair number of draft chapters, are =
now available
online; see (link from) <a =
href=3D"http://amir.beesites.co.il/book.html">http://amir.beesites.co.il/=
book.html</a>.
I've recently added to the site few more lectures (payments, voting, =
trust,…)
and the chapter on micropayments. Still a long way to go, but I think it =
may
already provide some value. <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>You are
encouraged to use the presentations and draft-chapters from that site =
(you'll
find the chapters under `Notes` column). The material is copyrighted but =
you
can use it for personal use and study, and definitely encouraged to use =
to give
courses; please inform me of any non-personal use.<span
style=3D'mso-spacerun:yes'>=A0 </span>My goal is to create a textbook =
which can be
used for introductory courses in cryptography, secure communication and =
secure
commerce & payments (for undergrads and graduates). =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>I appreciate
your feedback and suggestions, in particular, please let me know if =
there are
other areas you think I should cover. <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Enclosed is
the current table of contents (most subject already contain lecture =
and/or
draft/partial chapters – others marked TBD): =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></fo=
nt></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1.
Introduction<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>2. Security
threats and requirements<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3.
Principles of Modern Cryptography<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>4.
Cryptography I: encryption and randomness<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>5.
Cryptography II: Hashing and Message Authentication =
(MAC)<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>6.
Cryptography III: Public Key Cryptography<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>7.
Cryptography IV: distributed and proactive cryptography (and secret =
sharing)
[TBD] <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>8. PKI and
certificates <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>9. Secure
Communication I: network reliability and security (TCP/IP, firewalls,
tunneling, denial of service) <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>10. Secure
Communication II: Authentication, Authorization and Key Distribution =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>11. Secure
Communication<span style=3D'mso-spacerun:yes'>=A0 </span>III: IP layer =
security
(IPSec, IKE) <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>12. Secure
Communication IV: transport layer security – SSL, TLS, WTLS and =
WEP <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>13. Secure
XML <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>14.
Security, Trust and Reputation <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>15. Secure
e-Banking and accounts [TBD] <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>16. Secure
Payments I: overview, credit card payments, mobile payments =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>17. Secure
Payments II: micropayments, money transfer<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>18. Privacy
and anonymity: digital cash, anonymous communication [TBD] =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>19. Content
Protection and Security for Remote Code <o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>20. Trusted
third party services – Notary, e-vault, secure agents [TBD] =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>21. Advanced
protocols – voting, gambling, … =
<o:p></o:p></span></font></p>
<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>22.
Conclusion and social/legal issues [TBD]<o:p></o:p></span></font></p>
<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'>Cheers,
<o:p></o:p></span></font></p>
<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'><o:p> </o:p></span></fon=
t></p>
<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><st1:PersonNam=
e><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'>Amir
Herzberg</span></font></st1:PersonName><span =
style=3D'mso-no-proof:yes'><o:p></o:p></span></p>
<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p> </o:p></span></font></p>
</div>
</body>
</html>
------=_NextPart_000_001D_01C1AA76.314A4BA0--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com