Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

U. Washington Crypto Course Now Online for Free 173

Alien54 writes "Who wants to pay for Stanford's Crypto Course, when University of Washington has made the whole Cryptography Course available online for free. Yes, all the presentations, videos (mp3, WMV), homework, quizzes etc. are available online. The material seems pretty decent, and is intended for an advanced audience." Found on linkfilter.
This discussion has been archived. No new comments can be posted.

U. Washington Crypto Course Now Online for Free

Comments Filter:
  • by Sheetrock ( 152993 ) on Sunday June 04, 2006 @10:20AM (#15466278) Homepage Journal
    The MIT OpenCourseWare [mit.edu] site has a sizeable amount of free learning materials. I had it bookmarked a while back when they weren't offering that much but they've since put a lot online.
  • Thanks (Score:4, Informative)

    by backslashdot ( 95548 ) on Sunday June 04, 2006 @10:30AM (#15466326)
    Yeah and it was on college's website before that too.

    Why don't i just visit all the websites on the internet every day? Then i wouldnt have to bother with the inconvenience of browsing slashdot.

    As for having the same writeup? The bottom of the text credits linkfilter .. duh.
  • by kfg ( 145172 ) on Sunday June 04, 2006 @10:40AM (#15466368)
    No.

    KFG
  • What Crypto Course? (Score:3, Informative)

    by jackb_guppy ( 204733 ) on Sunday June 04, 2006 @10:47AM (#15466391)
    Did they reaad the material before posting this article??

    Some math questions involving a MOD and the final homework... How much bandwidth is VeiSign using.

    Where is the questions about breaking the code?
  • by bal ( 112317 ) on Sunday June 04, 2006 @11:09AM (#15466485)
    Winter '06 was actually our second crypto class for UW PMP; lectures and materials from when Josh Benaloh and I taught crypto in Winter '02 are also available on-line [washington.edu]. The material covered in the two courses is similar (we added material on cryptanalysis in '06 and updated the existing material). If you're working through the course at home you might find it helpful to work through the '02 assignments as well.
  • by tetrisaddict ( 979118 ) on Sunday June 04, 2006 @11:30AM (#15466588)
    On a related note I've recently noticed this [plus.com] post about getting into the theory of cryptography. I don't know anything about the author nor the topic so I cannot verify is the advice is good, but it sounds reasonable.
    T
  • by angio ( 33504 ) on Sunday June 04, 2006 @11:42AM (#15466640) Homepage
    Since people seem to be interested in this, you might also take a peek at
    the CMU computer networks course [cmu.edu], which I put online almost entirely (lecture nodes, video, homeworks, and the programming projects). Click on "Syllabus" to get to the contentful-bits. Feedback is welcome: Srini and I hope that leaving it online will be useful for students and instructors everywhere.
  • by Anonymous Coward on Sunday June 04, 2006 @01:36PM (#15467269)
    I think he's talking about the Stanford link which is a 'certificate' course and, after a cursory glance, does not appear to have any mathematical foundation.

    In contrast, the U.Wash. course does seem to be for a degree program, actually studying the mathematics of cryptography.

    Why these two were compared is a mystery.
  • by MK_CSGuy ( 953563 ) on Sunday June 04, 2006 @07:15PM (#15468851)
    Still one way hash - the "server" calculates the hash and stores it,
    and when it receives the password from the "client" (if it is a real client-server-over-network scenario then obviously you should transfer the password safely, uing SSH for example) it calculates its hash and compares it with the stored hash. If it's a match - bingo.
    Because it is much more problematic to get the password from its calculated hash, it is safer to store the hash and not the password.
    In its most basic form you can still attack it (Rainbow tables [wikipedia.org]) but you can defend against it with salting [wikipedia.org].

    Hey, just found through that wikipedia article about salting this article about Storing Passwords - done right [aspheute.com]. Haven't read it myself really, but from skimming I can see that it implements a salted hash mechanism in C# & ASP. Maybe it could prove useful to you or others.

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...