available draft chapters and lectures on `secure communication and commerce using crypto`

Amir Herzberg amir at newgenpay.com
Thu Jan 31 09:41:53 EST 2002


Hi all, 
 
As you may already know, I'm working on a text-book, to be published by
Prentice Hall, titled: Introduction to Secure Communication and Commerce
Using Cryptography. 
 
Lectures covering much of the material, and a fair number of draft
chapters, are now available online; see (link from)
http://amir.beesites.co.il/book.html. I've recently added to the site
few more lectures (payments, voting, trust,
) and the chapter on
micropayments. Still a long way to go, but I think it may already
provide some value. 
 
You are encouraged to use the presentations and draft-chapters from that
site (you'll find the chapters under `Notes` column). The material is
copyrighted but you can use it for personal use and study, and
definitely encouraged to use to give courses; please inform me of any
non-personal use.  My goal is to create a textbook which can be used for
introductory courses in cryptography, secure communication and secure
commerce & payments (for undergrads and graduates). 
 
I appreciate your feedback and suggestions, in particular, please let me
know if there are other areas you think I should cover. 
 
Enclosed is the current table of contents (most subject already contain
lecture and/or draft/partial chapters – others marked TBD): 
 
1. Introduction
2. Security threats and requirements
3. Principles of Modern Cryptography
4. Cryptography I: encryption and randomness
5. Cryptography II: Hashing and Message Authentication (MAC)
6. Cryptography III: Public Key Cryptography
7. Cryptography IV: distributed and proactive cryptography (and secret
sharing) [TBD] 
8. PKI and certificates 
9. Secure Communication I: network reliability and security (TCP/IP,
firewalls, tunneling, denial of service) 
10. Secure Communication II: Authentication, Authorization and Key
Distribution 
11. Secure Communication  III: IP layer security (IPSec, IKE) 
12. Secure Communication IV: transport layer security – SSL, TLS, WTLS
and WEP 
13. Secure XML 
14. Security, Trust and Reputation 
15. Secure e-Banking and accounts [TBD] 
16. Secure Payments I: overview, credit card payments, mobile payments 
17. Secure Payments II: micropayments, money transfer
18. Privacy and anonymity: digital cash, anonymous communication [TBD] 
19. Content Protection and Security for Remote Code 
20. Trusted third party services – Notary, e-vault, secure agents [TBD] 
21. Advanced protocols – voting, gambling, 
 
22. Conclusion and social/legal issues [TBD]
 
Cheers, 
 
Amir Herzberg
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20020131/04835801/attachment.html>


More information about the cryptography mailing list