Information Security

Mohammed Al-Hawajri, Mariam (2015)

Course Outline and Lectures:


The following is a tentative outline for the lectures for the course:


Date Module Lecture Description Reading
Jan 19 1 1 Introduction, Definitions, and Threat Models
Jan 28 2 Cryptographic Primitives (Symmetric and Assymetric Encryption)
Feb 2 3 Cryptographic Primitives (Signatures and Hashing)
Feb 9 4 Epistemic Logic for Information Security
Feb 16 5 The Dolev-Yao Model
Feb 23 6 Formal Verification of Security Protocols
TBD 2 7 Heartbleed Vulnerability
TBD 8 Privacy and Security in Web Browsing
TBD 9 Electronic Voting Machines
TBD 10 Prompt Injection in LLMs
TBD 3 12 Zero-Knowledge Proofs
TBD 13 Secure Multi-party Computation
TBD 14 Post-Quantum Cryptography

back to course