This course presents case studies of the design of various security protocols including SSL, WEP / WPA, IPSec, and Kerberos. We focus on discussing the pros and cons of various security trade-offs involved in the design of such protocols, and we describe vulnerabilities that some of these protocols are susceptible to due to design flaws. It is recommended that students take Using Cryptography Correctly as a prerequisite for this course, as a working knowledge of cryptographic primitives will be assumed.
This course will be retiring on August 31, 2013.
Please email email@example.com with any questions.
We recommend you have the equivalent of a BS in Computer Science and a background in security.
We highly recommend that you take this course, Software Security Foundations Certificate (XACS101) as the 1st course within the Stanford ACS certificate program. It provides the fundamentals necessary for the subsequent courses in the program.