Thanks to the fine folks at www.ps2pdf.com, I've just updated my godzilla
crypto tutorial, and the resulting PDF files are about 25% smaller than those 
produced by Distiller.  Updated sections include coverage of PKCS #11, PC/SC, 
JavaCard/OCF, iButtons, contactless smart cards, DNSSEC, e-cheques, and many
small changes here and there in various sections (the crypto politics section
is still a bit out of date in places).

You can get the tutorial via http://www.cs.auckland.ac.nz/~pgut001/tutorial,
it contains a total of 583 slides in 8 parts, of which the first 7 are the
tutorial itself and the 8th is extra material which covers crypto politics:

Part1, 66 slides: Security threats and requirements, services and mechanisms,
historical ciphers, cipher machines, stream ciphers, RC4, block ciphers, DES,
breaking DES, brute-force attacks, other block ciphers (triple DES, RC2, IDEA,
Blowfish, CAST-128, Skipjack, GOST, AES), block cipher encryption modes,
public-key encryption (RSA, DH, Elgamal, DSA), elliptic curve algorithms, hash
and MAC algorithms (MD2, MD4, MD5, SHA-1, RIPEMD-160, the HMAC's).

Part2, 116 slides: Key management, key distribution, the certification process,
X.500 and X.500 naming, certification heirarchies, X.500 directories and LDAP,
the PGP web of trust, certificate revocation, X.509 certificate structure and
extensions, certificate profiles, setting up and running a CA, CA policies,
RA's, timestamping, PGP certificates, SPKI, digital signature legislation.

Part3, 103 slides: IPSEC, ISAKMP, Oakley, Photuris, SKIP, ISAKMP/Oakley (I need
to cover IKE, I know), SSL, non-US strong SSL, SGC, TLS, S-HTTP, SSH, DNSEC, 
SNMP security, email security mechanisms, PEM, the PEM CA model, PGP, PGP keys 
and the PGP trust model, MOSS, PGP/MIME, S/MIME and CMS, MSP.

Part4, 55 slides: User authentiction, Unix password encryption, LANMAN and NT
domain authentication and how to break it, Netware 3.x and 4.x authentication,
Kerberos 4 and 5, Kerberos-like systems (KryptoKnight, SESAME, DCE),
authentication tokens, SecurID, S/Key, OPIE, PPP PAP/CHAP, PAP variants (SPAP,
ARAP, MSCHAP), RADIUS, TACACS/XTACACS/TACACS+, ANSI X9.26, FIPS 196,
biometrics, PAM.

Part 5, 37 slides: Electronic payment mechanisms, Internet transactions,
payment systems (Netcash, Cybercash, book entry systems in general), Digicash,
e-cheques, SET, the SET CA model.

Part 6, 48 slides: Why security is hard to get right, buffer overflows,
protecting data in memory, storage sanitisation, data recovery techniques,
random number generation, TEMPEST, snake oil crypto, selling security.

Part 7, 87 slides: Smart cards, smart card file structures, card commands,
electronic purse standards (prEN 1546, Telequick), PKCS #11, JavaCard/OCF,
PC/SC, iButtons, attacks on smart cards, voice encryption, GSM security and how
to break it, traffic analysis, anonymity, mixes, onion routing, mixmaster,
crowds, steganography, watermarking, misc. crypto applications (hashcash, PGP
Moose).

Part 8, 71 slides: History of crypto politics, digital telephony, Clipper,
Fortezza and Skipjack, post-Clipper crypto politics, US export controls,
effects of export controls, legal challenges, French and Russian controls,
non-US controls (Wassenaar), Menwith Hill, Echelon, blind signal demodulation,
undersea cable tapping, European parliament reports on Echelon, Echelon and
export controls, Cloud Cover, UK DTI proposals, various GAK issues.


Reply via email to