Security and Cryptography (CSS 322)

Introduction to Security

Lecture Notes
PDF | MP3 | Video: part 1
Handouts
Readings
Stallings: chapter 1 | Forouzan: chapter 1 | Kaufman: chapter 1
Links

Classical Encryption Techniques

Lecture Notes
PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2
Readings
Stallings: chapter 2 | Forouzan: chapter 3 | Kaufman: chapter 2
Links

Block Ciphers and DES

Lecture Notes
PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2, part 3
Readings
Stallings: chapter 3 | Forouzan: chapter 5/6 | Kaufman: chapter 3
Handouts
Links

Advanced Encryption Standard

AES is not covered in detail this year; you can find an explanation of AES in the textbook, as well as examples from the links below
Readings
Stallings: chapter 5 | Forouzan: chapter 7 | Kaufman: chapter 3
Handouts
Links

Modes of Operation

Lecture Notes
PDF| MP3: Part 1, Part 2 | Video: part 1
Readings
Stallings: chapter 6 | Forouzan: - | Kaufman: chapter 4

Psuedorandom Numbers and Stream Ciphers

Lecture Notes
PDF | MP3: No recording
Readings
Stallings: chapter 7 | Forouzan: - | Kaufman: chapter 4
Handouts
Links

Number Theory

Lecture Notes
PDF | MP3: Part 1, Part 2 | Video: part 1, part 2
Readings
Stallings: chapter 8 | Forouzan: chapter 9 | Kaufman: chapter 7
Handouts

Public Key Cryptography

Lecture Notes
PDF | MP3: Part 1, Part 2, Part 3, Part 4 | Video: part 1, part 2, part 3
Readings
Stallings: chapter 9/10 | Forouzan: chapter 10 | Kaufman: chapter 6
Handouts
Links

Cryptographic Hash Functions

Lecture Notes
PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2, part 3
Readings
Stallings: chapter 11 | Forouzan: chapter 11/12 | Kaufman: chapter 5
Handouts
Links

Message Authentication Codes

Lecture Notes
PDF | MP3: Part 1, Part 2 | Video: part 1
Readings
Stallings: chapter 12 | Forouzan: chapter 11/12 | Kaufman: chapter 5

Digital Signatures

Lecture Notes
none (covered in Hash and MAC functions)
Readings
Stallings: chapter 13 | Forouzan: chapter 11/12 | Kaufman: chapter 5/6

Key Management and Distribution

Lecture Notes
PDF | MP3: Part 1, Part 2, Part 3, Part 4 | Video: part 1, part 2, part 3
Readings
Stallings: chapter 14 | Forouzan: chapter 15 | Kaufman: chapter 15
Links

Passwords

Lecture Notes
PDF | MP3: Part 1, Part 2 | Video: part 1, part 2
Readings
Stallings: chapter 15/20 | Forouzan: chapter 14 | Kaufman: chapter 9/10
Links

Transport Level Security

Lecture Notes
PDF | MP3: Part 1 | Part 2 | Part 3 | Video: part 1, part 2
Readings
Stallings: chapter 16 | Forouzan: chapter 17/18 | Kaufman: chapter 19
Handouts
Links

IP Security

IPsec is not covered in detail this year; you can find an explanation of IPsec in the textbook.
Readings
Stallings: chapter 19 | Forouzan: chapter 17/18 | Kaufman: chapter 17/18
Links

Firewalls

Firewalls are not covered in detail this year; you can find an explanation of firewalls in the textbook.
Readings
Stallings: chapter 22 | Forouzan: - | Kaufman: chapter 23

Malicious Software

Lecture Notes
PDF | MP3: Part 1 | Part 2 | Video: part 1, part 2
Readings
Stallings: chapter 21 | Forouzan: - | Kaufman: -
Links

Return to: CSS322 Home | Course List | Steven Gordon's Home | SIIT