[10344] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

available draft chapters and lectures on `secure communication and commerce using crypto`

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Fri Feb 1 13:34:51 2002

Reply-To: <amir@beesites.co.il>
From: "Amir Herzberg" <amir@newgenpay.com>
To: <cryptography@wasabisystems.com>
Date: Thu, 31 Jan 2002 16:41:53 +0200
Message-ID: <001c01c1aa65$6dc17ba0$323cfea9@newgenpay>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_001D_01C1AA76.314A4BA0"

This is a multi-part message in MIME format.

------=_NextPart_000_001D_01C1AA76.314A4BA0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi all,=20
=20
As you may already know, I'm working on a text-book, to be published by
Prentice Hall, titled: Introduction to Secure Communication and Commerce
Using Cryptography.=20
=20
Lectures covering much of the material, and a fair number of draft
chapters, are now available online; see (link from)
http://amir.beesites.co.il/book.html. I've recently added to the site
few more lectures (payments, voting, trust,=85) and the chapter on
micropayments. Still a long way to go, but I think it may already
provide some value.=20
=20
You are encouraged to use the presentations and draft-chapters from that
site (you'll find the chapters under `Notes` column). The material is
copyrighted but you can use it for personal use and study, and
definitely encouraged to use to give courses; please inform me of any
non-personal use.  My goal is to create a textbook which can be used for
introductory courses in cryptography, secure communication and secure
commerce & payments (for undergrads and graduates).=20
=20
I appreciate your feedback and suggestions, in particular, please let me
know if there are other areas you think I should cover.=20
=20
Enclosed is the current table of contents (most subject already contain
lecture and/or draft/partial chapters =96 others marked TBD):=20
=20
1. Introduction
2. Security threats and requirements
3. Principles of Modern Cryptography
4. Cryptography I: encryption and randomness
5. Cryptography II: Hashing and Message Authentication (MAC)
6. Cryptography III: Public Key Cryptography
7. Cryptography IV: distributed and proactive cryptography (and secret
sharing) [TBD]=20
8. PKI and certificates=20
9. Secure Communication I: network reliability and security (TCP/IP,
firewalls, tunneling, denial of service)=20
10. Secure Communication II: Authentication, Authorization and Key
Distribution=20
11. Secure Communication  III: IP layer security (IPSec, IKE)=20
12. Secure Communication IV: transport layer security =96 SSL, TLS, WTLS
and WEP=20
13. Secure XML=20
14. Security, Trust and Reputation=20
15. Secure e-Banking and accounts [TBD]=20
16. Secure Payments I: overview, credit card payments, mobile payments=20
17. Secure Payments II: micropayments, money transfer
18. Privacy and anonymity: digital cash, anonymous communication [TBD]=20
19. Content Protection and Security for Remote Code=20
20. Trusted third party services =96 Notary, e-vault, secure agents =
[TBD]=20
21. Advanced protocols =96 voting, gambling, =85=20
22. Conclusion and social/legal issues [TBD]
=20
Cheers,=20
=20
Amir Herzberg
=20

------=_NextPart_000_001D_01C1AA76.314A4BA0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:p=3D"urn:schemas-microsoft-com:office:powerpoint" =
xmlns:oa=3D"urn:schemas-microsoft-com:office:activation" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 10">
<meta name=3DOriginator content=3D"Microsoft Word 10">
<link rel=3DFile-List href=3D"cid:filelist.xml@01C1AA76.302CF4C0">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:DoNotRelyOnCSS/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:DocumentKind>DocumentEmail</w:DocumentKind>
  <w:EnvelopeVis/>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
  </w:Compatibility>
  <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
 </w:WordDocument>
</xml><![endif]--><!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;
	text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
	{margin:0cm;
	margin-bottom:.0001pt;
	text-align:right;
	mso-pagination:widow-orphan;
	direction:rtl;
	unicode-bidi:embed;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
p
	{mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	mso-style-noshow:yes;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:windowtext;}
@page Section1
	{size:595.3pt 841.9pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;
	mso-header-margin:35.4pt;
	mso-footer-margin:35.4pt;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 10]>
<style>
 /* Style Definitions */=20
 table.MsoNormalTable
	{mso-style-name:"\05D8\05D1\05DC\05D4 \05E8\05D2\05D9\05DC\05D4";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Times New Roman";}
</style>
<![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple =
style=3D'tab-interval:36.0pt'>

<div class=3DSection1>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Hi all, =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>As you may
already know, I'm working on a text-book, to be published by Prentice =
Hall,
titled: Introduction to Secure Communication and Commerce Using =
Cryptography. <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Lectures
covering much of the material, and a fair number of draft chapters, are =
now available
online; see (link from) <a =
href=3D"http://amir.beesites.co.il/book.html">http://amir.beesites.co.il/=
book.html</a>.
I've recently added to the site few more lectures (payments, voting, =
trust,&#8230;)
and the chapter on micropayments. Still a long way to go, but I think it =
may
already provide some value. <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>You are
encouraged to use the presentations and draft-chapters from that site =
(you'll
find the chapters under `Notes` column). The material is copyrighted but =
you
can use it for personal use and study, and definitely encouraged to use =
to give
courses; please inform me of any non-personal use.<span
style=3D'mso-spacerun:yes'>=A0 </span>My goal is to create a textbook =
which can be
used for introductory courses in cryptography, secure communication and =
secure
commerce &amp; payments (for undergrads and graduates). =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>I appreciate
your feedback and suggestions, in particular, please let me know if =
there are
other areas you think I should cover. <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Enclosed is
the current table of contents (most subject already contain lecture =
and/or
draft/partial chapters &#8211; others marked TBD): =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1.
Introduction<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>2. Security
threats and requirements<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3.
Principles of Modern Cryptography<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>4.
Cryptography I: encryption and randomness<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>5.
Cryptography II: Hashing and Message Authentication =
(MAC)<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>6.
Cryptography III: Public Key Cryptography<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>7.
Cryptography IV: distributed and proactive cryptography (and secret =
sharing)
[TBD] <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>8. PKI and
certificates <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>9. Secure
Communication I: network reliability and security (TCP/IP, firewalls,
tunneling, denial of service) <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>10. Secure
Communication II: Authentication, Authorization and Key Distribution =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>11. Secure
Communication<span style=3D'mso-spacerun:yes'>=A0 </span>III: IP layer =
security
(IPSec, IKE) <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>12. Secure
Communication IV: transport layer security &#8211; SSL, TLS, WTLS and =
WEP <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>13. Secure
XML <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>14.
Security, Trust and Reputation <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>15. Secure
e-Banking and accounts [TBD] <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>16. Secure
Payments I: overview, credit card payments, mobile payments =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>17. Secure
Payments II: micropayments, money transfer<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>18. Privacy
and anonymity: digital cash, anonymous communication [TBD] =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>19. Content
Protection and Security for Remote Code <o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>20. Trusted
third party services &#8211; Notary, e-vault, secure agents [TBD] =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>21. Advanced
protocols &#8211; voting, gambling, &#8230; =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'mso-layout-grid-align:none;text-autospace:none'><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>22.
Conclusion and social/legal issues [TBD]<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'>Cheers,
<o:p></o:p></span></font></p>

<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'><o:p>&nbsp;</o:p></span></fon=
t></p>

<p class=3DMsoAutoSig =
style=3D'text-align:left;direction:ltr;unicode-bidi:embed'><st1:PersonNam=
e><font
 size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;mso-no-proof:yes'>Amir
 Herzberg</span></font></st1:PersonName><span =
style=3D'mso-no-proof:yes'><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_000_001D_01C1AA76.314A4BA0--




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post