Security, exercise course, Fall 2008
Information about the lectures can be found
on a different page.
Assignment 1: Security goals
- Handed out: Wednesday September 10.
- Deadline: Friday September 19, during the lecture.
- Assignment: opgave1.pdf
The link Authentication vs. Authorization and the text
Identification and Authentication
may help you to work on the task 3.
Assignment 2: Introducing cryptography and repeating security goals
- Handed out: Wednesday September 17.
- Deadline: Friday September 26, during the lecture.
- Assignment: opgave2.pdf
The link ASCII table on wiki
may help you to work on the task D.
Assignment 3: Introducing hash functions and Vigenere ciphers
The link Vigenere cipher on wiki
may help you to work on the task C.
Assignment 4: Analysing simple cryptographic protocols and repeating monoalphabetic ciphers
- Handed out: Wednesday October 1.
- Deadline: Friday October 10, during the lecture.
- Assignment: opgave4.pdf
Assignment 5: Public key cryptography
Assignment 6: Simple authentication protocols
- Handed out: Wednesday October 22.
- Deadline: Friday October 31, during the lecture.
- Assignment: opgave6.pdf
Assignment 7: Key exchange protocols
- Handed out: Wednesday October 29.
- Deadline: Friday November 7, during the lecture.
- Assignment: opgave7.pdf
Assignment 8: Bell-Lapadula model, CA, MAC
- Handed out: Wednesday November 5 (very late).
- Deadline: Friday November 14, during the lecture.
- Assignment: opgave8.pdf
Assignment 9: Practicing with PGP
- Handed out: Wednesday November 26.
- Deadline: Friday December 5, during the lecture.
- Assignment: opgave9.pdf
Assignment 10: Learning Java Cryptography Architecture
- Handed out: Wednesday December 3.
- Deadline: Friday December 12.
- Assignment: opgave10.pdf
Assignment 11: Block Cipher Modes. Traffic Pricing.
- Handed out: Wednesday December 10.
- Deadline: Friday December 19.
- Assignment: opgave11.pdf
Assignment 12: Elementary number theory.
- Handed out: Thursday December 18.
- Deadline: Friday January 9.
- Assignment: opgave12.pdf