U. Washington Crypto Course Now Online for Free 173
Alien54 writes "Who wants to pay for Stanford's Crypto Course, when University of Washington has made the whole Cryptography Course available online for free. Yes, all the presentations, videos (mp3, WMV), homework, quizzes etc. are available online. The material seems pretty decent, and is intended for an advanced audience." Found on linkfilter.
Also worth visiting... (Score:5, Informative)
Thanks (Score:4, Informative)
Why don't i just visit all the websites on the internet every day? Then i wouldnt have to bother with the inconvenience of browsing slashdot.
As for having the same writeup? The bottom of the text credits linkfilter
Re:What about certifications? (Score:2, Informative)
KFG
What Crypto Course? (Score:3, Informative)
Some math questions involving a MOD and the final homework... How much bandwidth is VeiSign using.
Where is the questions about breaking the code?
Winter '02 course is also available on-line (Score:5, Informative)
Independant Cryptography Learning (Score:2, Informative)
T
Related: Networks course at CMU (Score:5, Informative)
the CMU computer networks course [cmu.edu], which I put online almost entirely (lecture nodes, video, homeworks, and the programming projects). Click on "Syllabus" to get to the contentful-bits. Feedback is welcome: Srini and I hope that leaving it online will be useful for students and instructors everywhere.
Re:What Crypto Course? (Score:1, Informative)
In contrast, the U.Wash. course does seem to be for a degree program, actually studying the mathematics of cryptography.
Why these two were compared is a mystery.
Re:Study cryptography! (Score:2, Informative)
and when it receives the password from the "client" (if it is a real client-server-over-network scenario then obviously you should transfer the password safely, uing SSH for example) it calculates its hash and compares it with the stored hash. If it's a match - bingo.
Because it is much more problematic to get the password from its calculated hash, it is safer to store the hash and not the password.
In its most basic form you can still attack it (Rainbow tables [wikipedia.org]) but you can defend against it with salting [wikipedia.org].
Hey, just found through that wikipedia article about salting this article about Storing Passwords - done right [aspheute.com]. Haven't read it myself really, but from skimming I can see that it implements a salted hash mechanism in C# & ASP. Maybe it could prove useful to you or others.