| Lecture Notes |
| 1. |
Introductory material, course administration handout, etc. |
| 2. |
Classical Encryption Techniques |
Updated January 15, 2016 |
download code Updated: January 13, 2016 |
| 3. |
Block Ciphers and the Data Encryption Standard |
Updated January 15, 2016 |
download code Updated: January 27, 2015 |
| 4. |
Finite Fields (PART 1): Groups, Rings, and Fields |
Updated January 21, 2016 |
|
| 5. |
Finite Fields (PART 2): Modular Arithmetic |
Updated February 28, 2016 |
download code
Updated: February 28, 2016
|
| 6. |
Finite Fields (PART 3): Polynomial Arithmetic |
Updated February 5, 2016 |
|
| 7. |
Finite Fields (PART 4): Finite Fields of the Form GF(2n) |
Updated February 5, 2016 |
download code
Updated: February 5, 2016
|
| 8. |
AES: The Advanced Encryption Standard |
Updated April 12, 2016 |
download code Updated: April 12, 2016 |
| 9. |
Using Block and Stream Ciphers for Secure Wired and WiFi
Communications |
Updated February 11, 2016 |
download code Updated: February 11, 2016 |
| 10. |
Key Distribution for Symmetric Key Cryptography and
Generating Random Numbers |
Updated February 11, 2016 |
download code |
| 11. |
Prime Numbers and Discrete Logarithms |
Updated February 28, 2016 |
download code Updated: February 28, 2016 |
| 12. |
Public-Key Cryptography and the RSA Algorithm |
Updated February 28, 2016 |
download code
Updated: February 28, 2016
|
| 13. |
Certificates, Digital Signatures, and the Diffie-Hellman
Key Exchange Algorithm |
Updated February 29, 2016 |
download code
Updated: February 28, 2016
|
| 14. |
Elliptic Curve Cryptography and Digital Rights Management |
Updated February 28, 2016 |
download code
Updated: February 28, 2016
|
| 15. |
Hashing for Message Authentication |
Updated April 12, 2016 |
download code
Updated: March 2, 2016
|
| 16. |
TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN Flooding, and The Shrew DoS Attack |
Updated April 16, 2016 |
download code
Updated: March 12, 2016
|
| 17. |
DNS and the DNS Cache Poisoning Attack |
Updated April 12, 2016 |
download code
Updated: March 23, 2016
|
| 18. |
Packet Filtering Firewalls (Linux) |
Updated March 23, 2016 |
download code |
| 19. |
Proxy-Server Based Firewalls |
Updated March 24, 2016 |
download code
Updated: March 24, 2016
|
| 20. |
PGP, IPSec, SSL/TLS, and Tor Protocols |
Updated March 29, 2016 |
|
| 21. |
The Buffer Overflow Attack |
Updated April 19, 2016 |
download code |
| 22. |
Malware: Viruses and Worms |
Updated April 21, 2016 |
download code
Updated: April 8, 2016
|
| 23. |
Port and Vulnerability Scanning, Packet Sniffing, Intrusion Detection, and Penetration Testing |
Updated April 7, 2016 |
|
| 24. |
Dictionary Attacks and Rainbow-Table Attacks on Password Protected Systems |
Updated April 12, 2016 |
|
| 25. |
Security Issues in Structured Peer-to-Peer Networks |
Updated April 20, 2016 |
|
| 26. |
Small-World Peer-to-Peer Networks and Their Security Issues |
Updated April 14, 2016 |
download code |
| 27. |
Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack |
Updated April 19, 2016 |
download code
Updated: April 17, 2016
|
| 28. |
Web Security: Cross-Site Scripting and Other Browser-Side Exploits |
Updated April 19, 2016 |
download code |
| 29. |
Bots, Botnets, and the DDoS Attacks |
Updated April 21, 2016 |
download code Updated: April 22, 2015 |
| 30. |
Mounting Targeted Attacks with Trojans and Social Engineering
--- Cyber Espionage |
Updated April 20, 2016 |
|
| 31. |
Filtering Out Spam |
Updated April 12, 2016 |
download code |
| 32. |
Security Vulnerabilities of Mobile Devices
|
Updated April 19, 2016 |
download code Updated: April 25, 2015 |
| 33. |
Index (HTML) |
Updated April 25, 2016 |
|