Lecture Notes |
1. |
Introductory material, course administration handout, etc. |
2. |
Some Basic Vocabulary of Computer and Network Security and a Brief Review of Classical Encryption Techniques |
Updated January 13, 2023 |
download code Updated: January 13, 2016 |
3. |
Block Ciphers and the Data Encryption Standard |
Updated January 17, 2023 |
download code Updated: January 15, 2018 |
4. |
Finite Fields (PART 1): Groups, Rings, and Fields |
Updated January 19, 2023 |
|
5. |
Finite Fields (PART 2): Modular Arithmetic |
Updated January 24, 2023 |
download code
Updated: February 28, 2016
|
6. |
Finite Fields (PART 3): Polynomial Arithmetic |
Updated January 26, 2023 |
|
7. |
Finite Fields (PART 4): Finite Fields of the Form GF(2n) |
Updated January 31, 2023 |
download code
Updated: February 5, 2016
|
8. |
AES: The Advanced Encryption Standard |
Updated March 8, 2023 |
download code Updated: February 2, 2018 |
9. |
Using Block and Stream Ciphers for Secure Wired and WiFi
Communications |
Updated February 7, 2023 |
download code Updated: February 11, 2016 |
10. |
Key Distribution for Symmetric Key Cryptography and
Generating Random Numbers |
Updated March 8, 2023 |
download code |
11. |
Prime Numbers and Discrete Logarithms |
Updated March 8, 2023 |
download code Updated: February 28, 2016 |
12. |
Public-Key Cryptography and the RSA Algorithm |
Updated February 16, 2023 |
download code
Updated: February 28, 2016
|
13. |
Certificates, Digital Signatures, and the Diffie-Hellman
Key Exchange Algorithm |
Updated February 21, 2023 |
download code
Updated: February 28, 2016
|
14. |
Elliptic Curve Cryptography and Digital Rights Management |
Updated February 23, 2023 |
download code
Updated: February 28, 2016
|
15. |
Hashing for Message Authentication
(Starting in 2018, this lecture now includes material on crypto currencies that I explain
with the help of my Python-based CeroCoinClient module that you can access
by clicking here.)
|
Updated February 28, 2023 |
download code
Updated: April 8, 2018
|
16. |
TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN Flooding, and The Shrew DoS Attack |
Updated March 2, 2023 |
download code
Updated: March 12, 2016
|
17. |
DNS and the DNS Cache Poisoning Attack |
Updated March 7, 2023 |
download code
Updated: March 23, 2016
|
18. |
Packet Filtering Firewalls (Linux) |
Updated March 9, 2023 |
download code |
19. |
Proxy-Server Based Firewalls |
Updated March 21, 2023 |
download code
Updated: March 24, 2016
|
20. |
PGP, IPSec, SSL/TLS, and Tor Protocols |
Updated March 23, 2023 |
|
21. |
The Buffer Overflow Attack |
Updated March 28, 2023 |
download code
Updated: April 3, 2017
|
22. |
Malware: Viruses and Worms |
Updated March 30, 2023 |
download code
Updated: April 6, 2022
|
23. |
Port and Vulnerability Scanning, Packet Sniffing, Intrusion Detection, and Penetration Testing |
Updated April 4, 2023 |
|
24. |
Dictionary Attacks and Rainbow-Table Attacks on Password Protected Systems |
Updated April 13, 2023 |
|
25. |
Security Issues in Structured Peer-to-Peer Networks |
Updated April 20, 2023 |
|
26. |
Small-World Peer-to-Peer Networks and Their Security Issues |
Updated April 20, 2023 |
download code |
27. |
Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack |
Updated April 18, 2023 |
download code
Updated: April 14, 2017
|
28. |
Web Security: Cross-Site Scripting and Other Browser-Side Exploits |
Updated April 18, 2023 |
download code |
29. |
Bots, Botnets, DDoS Attacks, and DDoS Attack Mitigation |
Updated April 11, 2023 |
download code Updated: April 11, 2018 |
30. |
Mounting Targeted Attacks for Cyber Espionage with Trojans and Social Engineering |
Updated April 7, 2023 |
|
31. |
Filtering Out Spam |
Updated Apil 16, 2023 |
download code |
32. |
Security Vulnerabilities of Mobile Devices
|
Updated April 13, 2023 |
download code Updated: April 25, 2015 |
33. |
Index (HTML) |
Updated July 23, 2023 |
|