General info

  1. Please hand in your work 48 hours in advance of your supervision. For the first supervision I'll accept the work 24 hours in advance.
  2. If you hand in work late I may not get to mark it before the supervision. If you're struggling to get the work done within the time let me know and it may be possible to reschedule.
  3. Submit your work by email (preferably) or as hardcopy via the CL reception.
  4. If you submit by email, please PGP sign and encrypt your work.
  5. Please submit your working, even if you have trouble with a question. I'm more interested in the questions you have difficulty with than those you find easy.
  6. Feel free to contact me in advance of the supervision if you need guidance on a question.

Security II - Part II, Lent 2017-18

See the course page for more info.

Supervision 1

Covering secure hash functions and number theory.

Download the question sheet. Answer as many questions as you can.

Supervision 2

Download the question sheet. Answer as many questions as you can.

Supervision 3

Download the question sheet. Some questionos are marked as optionoal, but please as many questions as you can.

Supervision 4

Download the question sheet. Answer as many questions as you can.

Security I - Part IB, Easter 2016-17

See the course page for more info.

Supervision 1

Covering cryptography and security definitions.

Questions available on Otter.

Supervision 2

Cryptography, symmetric ciphers, passwords/PINs.

Questions available on Otter.

Supervision 3

Operating system security, access control, software security.

Questions available on Otter.

Security II - Part II, Lent 2015-16

See the course page for more info.

Prerequisites

Dr Daniel R. Thomas has kindly put together a worksheet covering prerequisites needed for the maths in Security II. The material has been moved from Security I, so don't be confused by the title. The sheet is optional, but would be worth doing if you're feeling a bit wobbly on the maths.

Supervision 1

Covering security, human factors, psychology, policies and passwords.

Questions available on Otter.

Supervision 2

Covering security economics and anonymity.

Questions available on Otter.

Supervision 3

Covering cryptography, secure hash functions, block ciphers and number theory.

Questions 1 - 10 of Dr Kuhn's exercise sheet, plus exam question 2013 Paper 8 Question 12.

Supervision 4

Covering number theory, Diffie-Hellman, RSA and DSA.

Questions 11 - 16 of Dr Kuhn's exercise sheet, plus exam question 2015 Paper 8 Question 9.