楊中皇老師 一百零五學年度 第二學期 (Spring 2017) 「密碼學研究」參考資料 :

  1. 課程大綱 (Syllabus)

  2. 國立高雄師範大學行事曆
  3. 高雄師範大學開課資料查詢系統
  4. 學校選課學生名單
  5. 期中報告(軟體功能與安裝): 4月27日,5月11日前繳交報告
  6. 5月18日不上課,調課到4月20日、4月27日、5月4日
  7. 6月15日不上課,調課
  8. 期末報告(軟體操作使用): 6月1日、6月8日,6月22日前繳交報告
  9.   姓名

    軟體功能、安裝: 4月27日

    軟體使用: 6月1日、6月8日

     相關網址

    1

    唐劍飛

    OpenKeychain

    https://github.com/open-keychain/open-keychain

    2

    李孟樵

    ECDH-Curve25519-Mobile

    https://github.com/duerrfk/ecdh-curve25519-mobile

    3

    沈瑞琳

    FIPS Library and Android

     https://wiki.openssl.org/index.php/FIPS_Library_and_Android

    4

    林紀睿

    ECDH key exchange on Android

     https://github.com/nelenkov/ecdh-kx

     

     

     

     

  10. 論文研讀,6月1日前繳交報告:

       林紀睿  5/25      

    (1) Performance Evaluation of Primitives for Privacy-Enhancing Cryptography

       唐劍飛  5/25

    (2) Evaluation of Cryptographic Capabilities for the Android Platform

       李孟樵  5/25

    (3) An Empirical Study of Cryptographic Misuse in Android Applications

       沈瑞琳  5/25

    (4) Evaluation of Cryptography Usage in Android Applications

     

  11. 微軟Windows Cryptographic Primitives

  12. Android設備 Cryptographic Primitives

  13. 維基解密2017年3月Android Vault 7

  14. Dan Boneh, Cryptography: From Mathematical Magic to Secure Communication, https://www.youtube.com/watch?v=4M8_Oo7lpiA

  15. Christopher Soghoian, Encryption used on Apple and Android devices, https://www.youtube.com/watch?v=SO9-rlrOXOA

  16. Application Signing, https://www.youtube.com/watch?v=P_jHoAsIzKI

  17. Generating a Signed APK Using Android Studio, https://www.youtube.com/watch?v=YWRLxgZej6s

  18. Encryption on Android, https://source.android.com/security/encryption/

  19. Application Signing on Android, https://source.android.com/security/apksigning/

  20. Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C

  21. Steve Jobs 賈伯斯 - 史丹佛大學畢業典禮演說

  22. 斯諾登效應的前因解讀

  23. Android 7.1 密碼學算法原始碼

  24. 2017年3月Android擊敗Windows,正式成為全球第一大作業系統Android超越Windows成互联网用户最常用操作系统

  25. 中國信息安全博士網

  26. We need hackers 我們需要駭客,https://www.ted.com/talks/rodrigo_bijou_governments_don_t_understand_cyber_warfare_we_need_hackers?language=zh-tw

  27. Everyday cybercrime,網路犯罪無所不在,https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?language=zh-tw

  28. The 1s and 0s behind cyber warfare,網路戰爭背後的1與0,https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare?language=zh-tw

  29. LEST WE REMEMBER: COLD BOOT ATTACKS ON ENCRYPTION KEYS, https://citp.princeton.edu/research/memory/

  30. 微信支付的安全規範  (local copy)  

  31. Android 7.1 Security Model Compatibility

  32. SM2橢圓曲線公鑰密碼算法、SM3密碼雜湊算法、SM4分組密碼算法

  33. 智慧型手機市場銷售 (2016)

  34. 強迫召回 三星將讓美Note 7不能用

  35. 安琚B威努特、滴滴出行招聘安全人员

  36. 太極信息安全招聘十大類安全人才

  37. 加拿大Certicom Corp.

  38. 大陸國家信息安全產品認證,http://www.isccc.gov.cn/zxyw/cprz/gjxxaqcprz/

  39. A Brief Overview of Cryptography, https://www.youtube.com/watch?v=Wgw3HNuKIN8

  40. Elliptic Curve Cryptography, https://www.youtube.com/results?search_query=elliptic+curve+cryptography

  41. Android Security State Of The Union, https://www.youtube.com/watch?v=aBWh7izacqg

  42. What's new in Android security (M and N Version) - Google I/O 2016, https://www.youtube.com/watch?v=XZzLjllizYs

  43. Android security architecture (by Nikolay Elenkov), https://www.youtube.com/watch?v=3asW-nBU-JU

  44. Nikolay Elenkov, Android Security Internals, 2014.

  45. Android Full-disk encryption
  46. Android 基于文件的加密

  47. 橢圓曲線公式繪圖 EccDraw.exe

  48. A.J. Menezes, et al, Handbook of Applied Cryptography  (CRC Press Series on Discrete Mathematics and Its Applications), 1996. 參閱http://www.cacr.math.uwaterloo.ca/hac/有PDF電子檔

  49. Android Security, https://source.android.com/security/

  50. Audun Jøsang, "Trust and Identity Management for Internet and Mobile Computing, " IET Information Security - Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications, 2012.

  51. HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung, "Implementations of Block Cipher SEED on Smartphone Operating Systems, " Proceedings of the Fifth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011).

  52. Nico Golde, SMS Vulnerability Analysis on Feature Phones,  M.S. Thesis, Technische Universität Berlin, Germany, 2011.

  53. Christian Hansen, A Framework for Identity and Privacy Management on Mobile Devices,  M.S. Thesis, University of Agder, Norway, 2010.

  54. Adrian Visoiu and Silvia Trif, "Open Source Security Components for Mobile Applications," Open Source Science Journal, Vol. 2, No. 2, 2010.

  55. Marco Bonetti, "Mobile privacy: Tor on the iPhone and other unusual devices, " DEFCON 18, 2010.

  56. Johannes Winter, "Trusted Computing Building Blocks for Embedded Linux-based ARM TrustZone Platforms," Proceedings of the 3rd ACM workshop on Scalable Trusted Computing, 2008.

  57. Murat Y. Kubilay, Security on Mobile Phones with Lightweight Cryptographic Message Syntax, M.S. Thesis, Middle East Technical University, Turkey, 2007.

  58. Florian Eisl, Smart Card Security Services for an Open Application Environment used in Mobile Phones, M.S. Thesis, Lund University, Sweden, 2004.

  59. Johnny L. Lo, A framework for cryptography algorithms on mobile devices, M.S. Thesis, University of Pretoria, South Africa, 2007.

  60. 線上課程Coursera.org網站,密碼學-I密碼學-II
  61. SELinux

  62. Android javax.crypto

  63. Android java.security

  64. Android Software Development Kit (SDK)
  65. Android Native Development Kit (NDK)
  66. Java Development Kit (JDK)
  67. Eclipse Downloads
  68. 手機市場佔有率
  69. Android Market
  70. Open Handset Alliance
  71. Android-x86
  72. 密碼學常見問題集 (FAQ)
  73. 美國國立密碼博物館 (National Cryptologic Museum)

  74. 國家圖書館 全國博碩士論文資訊網

  75. Right triangles and elliptic curves, http://math.uci.edu/~krubin/lectures/sumo/

  76. GuardKey (MyGuard) 保密碟, http://www.guardkey.com.tw/tw/

  77. Sun (Oracle)的密碼學演算法:https://docs.oracle.com/middleware/1213/idm/sec-app-dev-tools/crypto.htm#SDTRG002

  78. 日本政府Cryptrec計畫

  79. Cryptrec 2007報告書 (local copy)  

  80. 中國密碼學會, http://www.cacrnet.org.cn/

  81. 國家實驗研究院科技政策研究與資訊中心之大陸資訊安全機構名錄

  82. 大陸信息安全國家重點實驗室(The State Key Laboratory of Information Security,SKLOIS)

  83. 西安電子科技大學李暉教授:信息安全專業學生實踐能力培養的探索 (local copy)

  84. 西安電子科技大學王育民教授:資訊理論等專業的建設和參與建設的體會 (local copy)

  85. 西安電子科技大學王育民教授:訊息論專業發展的幾個片段 (local copy)

  86. 西安電子科技大學王育民教授:我與西電圖書館 世界圖書日有感 (local copy)

  87. 2009年西安電子科技大學通信工程學院工程碩士指導教師名單 (local copy)

  88. 密碼學常見問題集 (FAQ)

  89. 大數分解有獎徵 答

  90. 線上大數分解

  91. 密碼學相關免費工具軟體:(1) 木田祐司之UBASIC

  92. 密碼學相關免費工具軟體:(2) LiDIA  

  93. 密碼學相關免費工具軟體:(3) MIRACL 

  94. 密碼學相關免費工具軟體:(4) GMP 

  95. 密碼學相關免費工具軟體:(5) PARI-GP 

  96. 密碼學相關免費工具軟體:(6) NTL  

  97. 密碼學相關免費工具軟體:(7) Crypto++

  98. 密碼學相關免費工具軟體:(8) NUI Crypto

  99. Darrel Hankerson, Alfred Menezes, and Scott Vanstone, Guide to Elliptic Curve Cryptography, 2004.

  100. 2004年5月中國密碼年會與2004年8月美國Crypto年會的Rump Session,山東大學王小雲教授破解MD5和其他幾個one-way hash function (local copy)。NIST宣佈將於2010年淘汰SHA1 (local copy)

  101. 日本IPA資訊安全現狀, 2001年 (local copy)

  102. Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656-715, 1949. (local copy)

  103. A Layman's Guide to a Subset of ASN.1, BER, and DER: MS-Word, PostScript

  104. Certicom公司橢圓曲線密碼系統介紹

  105. FIPS 186-2Digital Signature Standard (DSS) January 2000http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf, http://csrc.nist.gov/publications/drafts/dss_recommendation.pdf

  106. NISTElliptic Curves Recommended for Federal Government UseJuly 1999 http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf

  107. D. B. Johnson and A. J. Menezes, Elliptic Curve DSA (ECDSA): An Enhanced DSA, 1999.

  108. 日本高知工業高等専門学校 高木和久(Kazuhisa Takagi) 橢圓曲線密碼系統介紹

  109. NISTDraft FIPS 180-2,Secure Hash Standard (SHS),SHA-256/SHA-384/SHA-512May 2001.

  110. 日本密碼產品之輸出管制

  111. 一天內破解DES報導: (1). RSA公司 (2). CNN公司  1999年1月

  112. 破解512位元RSA (1999年8月

  113. D. M. Gordon, "A Survey of Fast Exponentiation Methods," J. Algorithms, 1998,pp. 129-146.

  114. T. Garefalakis, "Primality Testing, Integer Factorization, and Discrete Logarithms," 2000.

  115. 破解109位元ECC (2002年11月) (mirror)
  116. Advanced Encryption Standard, FIPS 197, November 26, 2001.

  117. AES (Advanced Encryption Standard): October 2, 2000 - NIST announces that Rijndael has been selected as the proposed AES.

  118. RIJNDAEL (pronounced Rhine-doll)加解密演算法

  119. AES (Advanced Encryption Standard) 原始碼

  120. 人類目前已知最大的質數: 230402457-1 (9,152,052  decimal digits ) = ?  

  121. 逐年找到的大質數

  122. 大數分解紀錄

  123. One-Way Hash MD5原始碼(RFC1321)

  124. FIPS 180-2Secure Hash Standard (SHS)NIST,2002年8月。

  125. Block Cipher Modes of OperationSP 800-38ANIST,2001年12月。

  126. Arjen K. Lenstra and Eric R. Verheul, "Selecting Cryptographic Key Sizes", 1999.

  127. 密碼學技術評價報告書,IPA,2001年3月(日文)。

  128. 密碼學應用技術手冊,ECOM,2000年3月(日文)。

  129. Tamper Resistant密碼學演算法報告書,日本標準協會JSA,2004年3月(日文)。(local copy)

  130. 于根正志、岡本龍明,最近數位簽章之理論研究,日本銀行金融研究所,1999年11月(日文)。

  131. Sneakers (神鬼尖兵)

  132. 微軟公司CryptoAPI2.0

  133. 搜索引擎 AltaVista

  134. 搜索引擎 All the Web

  135. Windows 2000 Security Services

  136. 微軟公司視窗2000安全性服務 (中文)

  137. Claude E. Shannon, "Communication Theory of Secrecy Systems,"  Bell System Technical Journal,  Vol. 28, 1949, pp. 656-715.

  138. Claude E. Shannon, "A Mathematical Theory of Communication,"  Bell System Technical Journal,  vol. 27, pp. 379-423 and 623-656, July and October, 1948.

  139. National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standard (DES),  October 25, 1999.

  140. Eli Biham and Adi Shamir, Differential cryptanalysis of DES-like cryptosystems, Technical report CS90-16, Weizmann Institute of Science, 1990.

  141. J. L. Massey, "An Introduction to Contemporary Cryptology," Proc. IEEE,  Vol. 76, May 1988, pp. 533-549.

  142. W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, November 1976, pp. 644-654.

  143. W. Diffie, "The First Ten Years of Public-Key Cryptography," Proc. IEEE,   Vol. 76, No. 5, May 1988, pp. 560-577.

  144. T. Okamoto and E. Fujisaki, "On Comparison of Practical Digital Signature Schemes," NTT Review, Vol. 5, No. 1, January 1993, pp. 75-81.

  145. Specification of ESIGN Signature, Self Evaluation of ESIGN Signature.

  146. T. Okamoto, E. Fujisaki, and H. Morita, "TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash," submitted to IEEE P1363a, 1998. (pdf or zipped PostScript or PostScript format)

  147. Tatsuaki Okamoto, Shigenori Uchiyama and Eiichiro Fujisaki, "EPOC: Efficient Probabilistic Public-Key Encryption," submitted to IEEE P1363a, November 1998.  Specification of EPOC, Self Evaluation of EPOC.

  148. Camallia加解密演算法(Techniques SpecificationsSelf Evaluation Reports)

  149. Encrypting File System for Windows 2000

  150. RFC 2630, Cryptographic Message Syntax. R. Housley. June 1999.

  151. RFC 2628, Simple Cryptographic Program Interface (Crypto API). V. Smyslov. June 1999.

  152. RFC 2612,  The CAST-256 Encryption Algorithm. C. Adams, J. Gilchrist. June 1999.

  153. RFC 2437, PKCS #1: RSA Cryptography Specifications Version 2.0. B. Kaliski, J. Staddon. October 1998.

  154. RFC 2315, PKCS 7: Cryptographic Message Syntax Version 1.5. B. Kaliski. March 1998.

  155. Call for Papers: IACR Calendar of Events in Cryptology UCL Crypto Group - Call for papers Security & Privacy Calendar