ECS 153, Introduction to Computer Security
Fall Quarter, 1999
Department of Computer Science, UC Davis
Introduction
Study of the principles, mechanisms and implementation of computer
security and data protection. Policy, encryption and authentication,
access control and integrity models and mechanisms; network security;
secure systems; programming and vulnerabilities analysis. An existing
operating system will be studied.
Prerequisites:
ECS 150,
or
ECS 151A,
ECS 151B
This contains the index to all handouts and notes
for ECS 153, Fall Quarter 1999. The abbreviations FM, PDF, PS, and TXT
stand for Framemaker, Adobe PDF, Postscript, and ASCII text respectively.
Our Reading List
This is a collection of books that Tom and Matt quoted from
during discussions about computer security. There are lots
of others, of course; these are just ones we liked.
Interesting and Fun Books [FM] [PDF] [PS] [TXT]
Class Information
Homework
- Homework #1
[FM]
[PDF]
[PS]
[TXT], due October 11, 1999;
- Homework #2
[FM]
[PDF]
[PS]
[TXT], due October 27, 1999;
- Homework #3
[FM]
[PDF]
[PS]
[TXT], due November 12, 1999;
- Program #3
[FM]
[PDF]
[PS]
[TXT], due November 19, 1999
- Two Extra Credit Problems,
due October 29, 1999;
- Homework #4
[FM]
[PDF]
[PS]
[TXT], due December 6, 1999
Exams
Lecture Outlines
- Lecture #1, October 1, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #2, October 1, 1999 (Discussion)
[FM]
[PDF]
[PS]
[TXT]
- Lecture #3, October 6, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #4, October 8, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #5, October 11, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #6, October 13, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #7, October 15, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #8, October 15, 1999 (Discussion)
[FM]
[PDF]
[PS]
[TXT]
- Lecture #9, October 20, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #10, October 22, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #11, October 25, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #12, October 27, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #13, October 29, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #14, November 1, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #15, November 3, 1999
[FM]
[PDF]
[PS]
[TXT]
- midterm, November 5, 1999
- Lecture #17, November 8, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #18, November 10, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #19, November 12, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #20, November 15, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #21, November 17, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #22, November 19, 1999
[FM] [TXT]
- Lecture #23, November 22, 1999 [PDF]
[PS]
[TXT]
- Lecture #24, November 24, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #25, November 29, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #26, December 1, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #27, December 3, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #28, December 6, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #29, December 8, 1999
[FM]
[PDF]
[PS]
[TXT]
- Lecture #30, December 10, 1999
[FM]
[PDF]
[PS]
[TXT]
Puzzles
- Puzzle for October 1, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 1, 1999 (Discussion)
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 6, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 8, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 11, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 13, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 15, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 15, 1999 (Discussion)
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 20, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 22, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 25, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 27, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for October 29, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 1, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 3, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 10, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 15, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 17, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 24, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for November 29, 1999
[FM]
[PDF]
[PS] [TXT]
- Puzzle for December 3, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for December 6, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for December 8, 1999
[FM]
[PDF]
[PS]
[TXT]
- Puzzle for December 10, 1999
[FM]
[PDF]
[PS]
[TXT]
Project
Interesting and Fun Stuff
-
A really weak password encipherment algorithm
Microsoft encrypts your Windows NT password when stored on a Windows CE
device. But if you look carefully at their encryption algorithm, they
simply XOR the password with "susageP", Pegasus spelled backwards. Pegasus
is the code name of Windows CE.
-
The Gibraltar hack: Anatomy of a break-in
This recaps a break-in at PC Week. For the attacker's version (which has more details), see his write-up.
a break-in at PC Week. Fascinating reading.
-
Linux vs. Windows NT, according to Microsoft
This interesting web page contrasts Windows NT and Linux from the point of
view of exposing what Microsoft considers to be Linux myths, and Windows NT
reality. Read it and see what you think!
-
The state of software
This discusses why software is so bad. An interesting sociological commentary
to go with the technical discussion in class.
- The SGI Lavalamp Random Numbers
This page describes how SGI generates random numbers from a set of Lavalamps.
It has neat photos of the installation as well as access to the random numbers
themselves.
- Marcus Ranum's Firewall
Marcus Ranum, the developer of the first firewall, is an iconoclast who
dislikes being asked for the "perfect" firewalls. He finally
did this web page to show the only perfect firewall he's ever seen.
- A paper on the Enigma, by Tom Walcott
Aside from being an excellent example of a research project paper like I expect
for this class ... this is a fun discussion of Enigma. It's in PDF, but
a Postscript version is available here.
- DES
Here's the specification of the DES. Look in the appendix for the PC-1,
LSH, and PC-2 tables (and another description of how the key is computed).
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 12/12/99