<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:st1="urn:schemas-microsoft-com:office:smarttags" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<meta name=ProgId content=Word.Document>
<meta name=Generator content="Microsoft Word 10">
<meta name=Originator content="Microsoft Word 10">
<link rel=File-List href="cid:filelist.xml@01C1AA76.302CF4C0">
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
 name="PersonName"/>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:DoNotRelyOnCSS/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:DocumentKind>DocumentEmail</w:DocumentKind>
  <w:EnvelopeVis/>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
  </w:Compatibility>
  <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
 </w:WordDocument>
</xml><![endif]--><!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {mso-style-parent:"";
        margin:0cm;
        margin-bottom:.0001pt;
        mso-pagination:widow-orphan;
        font-size:12.0pt;
        font-family:"Times New Roman";
        mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;
        text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;
        text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
        {margin:0cm;
        margin-bottom:.0001pt;
        text-align:right;
        mso-pagination:widow-orphan;
        direction:rtl;
        unicode-bidi:embed;
        font-size:12.0pt;
        font-family:"Times New Roman";
        mso-fareast-font-family:"Times New Roman";}
p
        {mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        mso-pagination:widow-orphan;
        font-size:12.0pt;
        font-family:"Times New Roman";
        mso-fareast-font-family:"Times New Roman";}
span.EmailStyle17
        {mso-style-type:personal-compose;
        mso-style-noshow:yes;
        mso-ansi-font-size:10.0pt;
        mso-bidi-font-size:10.0pt;
        font-family:Arial;
        mso-ascii-font-family:Arial;
        mso-hansi-font-family:Arial;
        mso-bidi-font-family:Arial;
        color:windowtext;}
@page Section1
        {size:595.3pt 841.9pt;
        margin:72.0pt 90.0pt 72.0pt 90.0pt;
        mso-header-margin:35.4pt;
        mso-footer-margin:35.4pt;
        mso-paper-source:0;}
div.Section1
        {page:Section1;}
-->
</style>
<!--[if gte mso 10]>
<style>
 /* Style Definitions */ 
 table.MsoNormalTable
        {mso-style-name:"\05D8\05D1\05DC\05D4 \05E8\05D2\05D9\05DC\05D4";
        mso-tstyle-rowband-size:0;
        mso-tstyle-colband-size:0;
        mso-style-noshow:yes;
        mso-style-parent:"";
        mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
        mso-para-margin:0cm;
        mso-para-margin-bottom:.0001pt;
        mso-pagination:widow-orphan;
        font-size:10.0pt;
        font-family:"Times New Roman";}
</style>
<![endif]-->
</head>

<body lang=EN-US link=blue vlink=purple style='tab-interval:36.0pt'>

<div class=Section1>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>Hi all, <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>As you may
already know, I'm working on a text-book, to be published by Prentice Hall,
titled: Introduction to Secure Communication and Commerce Using Cryptography. <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>Lectures
covering much of the material, and a fair number of draft chapters, are now available
online; see (link from) <a href="http://amir.beesites.co.il/book.html">http://amir.beesites.co.il/book.html</a>.
I've recently added to the site few more lectures (payments, voting, trust,…)
and the chapter on micropayments. Still a long way to go, but I think it may
already provide some value. <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>You are
encouraged to use the presentations and draft-chapters from that site (you'll
find the chapters under `Notes` column). The material is copyrighted but you
can use it for personal use and study, and definitely encouraged to use to give
courses; please inform me of any non-personal use.<span
style='mso-spacerun:yes'>  </span>My goal is to create a textbook which can be
used for introductory courses in cryptography, secure communication and secure
commerce & payments (for undergrads and graduates). <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>I appreciate
your feedback and suggestions, in particular, please let me know if there are
other areas you think I should cover. <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>Enclosed is
the current table of contents (most subject already contain lecture and/or
draft/partial chapters – others marked TBD): <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>1.
Introduction<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>2. Security
threats and requirements<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>3.
Principles of Modern Cryptography<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>4.
Cryptography I: encryption and randomness<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>5.
Cryptography II: Hashing and Message Authentication (MAC)<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>6.
Cryptography III: Public Key Cryptography<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>7.
Cryptography IV: distributed and proactive cryptography (and secret sharing)
[TBD] <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>8. PKI and
certificates <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>9. Secure
Communication I: network reliability and security (TCP/IP, firewalls,
tunneling, denial of service) <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>10. Secure
Communication II: Authentication, Authorization and Key Distribution <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>11. Secure
Communication<span style='mso-spacerun:yes'>  </span>III: IP layer security
(IPSec, IKE) <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>12. Secure
Communication IV: transport layer security – SSL, TLS, WTLS and WEP <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>13. Secure
XML <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>14.
Security, Trust and Reputation <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>15. Secure
e-Banking and accounts [TBD] <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>16. Secure
Payments I: overview, credit card payments, mobile payments <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>17. Secure
Payments II: micropayments, money transfer<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>18. Privacy
and anonymity: digital cash, anonymous communication [TBD] <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>19. Content
Protection and Security for Remote Code <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>20. Trusted
third party services – Notary, e-vault, secure agents [TBD] <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>21. Advanced
protocols – voting, gambling, … <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-layout-grid-align:none;text-autospace:none'><font
size=2 face=Arial><span style='font-size:10.0pt;font-family:Arial'>22.
Conclusion and social/legal issues [TBD]<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>

<p class=MsoAutoSig style='text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3 face="Times New Roman"><span style='font-size:12.0pt;mso-no-proof:yes'>Cheers,
<o:p></o:p></span></font></p>

<p class=MsoAutoSig style='text-align:left;direction:ltr;unicode-bidi:embed'><font
size=3 face="Times New Roman"><span style='font-size:12.0pt;mso-no-proof:yes'><o:p> </o:p></span></font></p>

<p class=MsoAutoSig style='text-align:left;direction:ltr;unicode-bidi:embed'><st1:PersonName><font
 size=3 face="Times New Roman"><span style='font-size:12.0pt;mso-no-proof:yes'>Amir
 Herzberg</span></font></st1:PersonName><span style='mso-no-proof:yes'><o:p></o:p></span></p>

<p class=MsoNormal><font size=3 face="Times New Roman"><span style='font-size:
12.0pt'><o:p> </o:p></span></font></p>

</div>

</body>

</html>