Lecture Notes |
1. |
Introductory material, course administration handout, etc. |
2. |
Some Basic Vocabulary of Computer and Network Security and a Brief Review of Classical Encryption Techniques |
Updated January 11, 2024 |
download code Updated: January 13, 2016 |
3. |
Block Ciphers and the Data Encryption Standard |
Updated January 16, 2024 |
download code Updated: January 15, 2018 |
4. |
Finite Fields (PART 1): Groups, Rings, and Fields |
Updated January 25, 2024 |
|
5. |
Finite Fields (PART 2): Modular Arithmetic |
Updated January 25, 2024 |
download code
Updated: February 28, 2016
|
6. |
Finite Fields (PART 3): Polynomial Arithmetic |
Updated January 29, 2024 |
|
7. |
Finite Fields (PART 4): Finite Fields of the Form GF(2n) |
Updated January 30, 2024 |
download code
Updated: February 5, 2016
|
8. |
AES: The Advanced Encryption Standard |
Updated February 7, 2024 |
download code Updated: February 2, 2018 |
9. |
Using Block and Stream Ciphers for Secure Wired and WiFi
Communications |
Updated February 7, 2024 |
download code Updated: February 11, 2016 |
10. |
Key Distribution for Symmetric Key Cryptography and
Generating Random Numbers |
Updated February 8, 2024 |
download code |
11. |
Prime Numbers and Discrete Logarithms |
Updated February 13, 2024 |
download code Updated: February 28, 2016 |
12. |
Public-Key Cryptography and the RSA Algorithm |
Updated February 15, 2024 |
download code
Updated: February 28, 2016
|
13. |
Certificates, Digital Signatures, and the Diffie-Hellman
Key Exchange Algorithm |
Updated February 20, 2024 |
download code
Updated: February 28, 2016
|
14. |
Elliptic Curve Cryptography and Digital Rights Management |
Updated February 22, 2024 |
download code
Updated: February 28, 2016
|
15. |
Hashing for Message Authentication
(Starting in 2018, this lecture now includes material on crypto currencies that I explain
with the help of my Python-based CeroCoinClient module that you can access
by clicking here.)
|
Updated March 24, 2024 |
download code
Updated: April 8, 2018
|
16. |
TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN Flooding, and The Shrew DoS Attack |
Updated February 29, 2024 |
download code
Updated: March 12, 2016
|
17. |
DNS and the DNS Cache Poisoning Attack |
Updated March 7, 2024 |
download code
Updated: March 23, 2016
|
18. |
Packet Filtering Firewalls (Linux) |
Updated March 7, 2024 |
download code |
19. |
Proxy-Server Based Firewalls |
Updated March 21, 2024 |
download code
Updated: March 24, 2016
|
20. |
PGP, IPSec, SSL/TLS, and Tor Protocols |
Updated March 21, 2024 |
|
21. |
The Buffer Overflow Attack |
Updated March 26, 2024 |
download code
Updated: April 3, 2017
|
22. |
Malware: Viruses and Worms |
Updated March 28, 2024 |
download code
Updated: April 6, 2022
|
23. |
Port and Vulnerability Scanning, Packet Sniffing, Intrusion Detection, and Penetration Testing |
Updated April 9, 2024 |
|
24. |
Dictionary Attacks and Rainbow-Table Attacks on Password Protected Systems |
Updated April 11, 2024 |
|
25. |
Security Issues in Structured Peer-to-Peer Networks |
Updated April 18, 2024 |
|
26. |
Small-World Peer-to-Peer Networks and Their Security Issues |
Updated April 18, 2024 |
download code |
27. |
Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack |
Updated April 16, 2024 |
download code
Updated: April 14, 2017
|
28. |
Web Security: Cross-Site Scripting and Other Browser-Side Exploits |
Updated April 16, 2024 |
download code |
29. |
Bots, Botnets, DDoS Attacks, and DDoS Attack Mitigation |
Updated April 9, 2024 |
download code Updated: April 11, 2018 |
30. |
Mounting Targeted Attacks for Cyber Espionage with Trojans and Social Engineering |
Updated April 9, 2024 |
|
31. |
Filtering Out Spam |
Updated Apil 4, 2024 |
download code |
32. |
Security Vulnerabilities of Mobile Devices
|
Updated April 11, 2024 |
download code Updated: April 25, 2015 |
33. |
Index (HTML) |
Updated June 30, 2024 |
|