Security and Cryptography (CSS 322)
- Lecture Notes
- PDF | MP3 | Video: part 1
- Handouts
- Readings
-
Stallings: chapter 1 | Forouzan: chapter 1 | Kaufman: chapter 1
- Links
- Lecture Notes
- PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2
- Readings
-
Stallings: chapter 2 | Forouzan: chapter 3 | Kaufman: chapter 2
- Links
- Steganography example using outguess
- Simon Singh - a journalist who authored the Code Book. From the website you can download software from the CDROM that provides many examples and animations of classical (and current) encryption algorithms.
- CrypTool - free software for apply many encryption algorithms (classical, symmetric, public key) and analysing (breaking) ciphertexts. Highly recommended that you install this software and try it out. I use it to demonstrate examples in the lectures.
- NSA has some historical information, including documents on German cipher machines.
- Alph open-source, command-line based encryption software for classical algorithms
- Lecture Notes
- PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2, part 3
- Readings
-
Stallings: chapter 3 | Forouzan: chapter 5/6 | Kaufman: chapter 3
- Handouts
- Links
AES is not covered in detail this year; you can find an explanation of AES in the textbook, as well as examples from the links below
- Readings
-
Stallings: chapter 5 | Forouzan: chapter 7 | Kaufman: chapter 3
- Handouts
- Links
- Lecture Notes
- PDF| MP3: Part 1, Part 2 | Video: part 1
- Readings
-
Stallings: chapter 6 | Forouzan: - | Kaufman: chapter 4
- Lecture Notes
- PDF | MP3: No recording
- Readings
-
Stallings: chapter 7 | Forouzan: - | Kaufman: chapter 4
- Handouts
- Links
- Lecture Notes
- PDF | MP3: Part 1, Part 2 | Video: part 1, part 2
- Readings
-
Stallings: chapter 8 | Forouzan: chapter 9 | Kaufman: chapter 7
- Handouts
- Lecture Notes
- PDF | MP3: Part 1, Part 2, Part 3, Part 4 | Video: part 1, part 2, part 3
- Readings
-
Stallings: chapter 9/10 | Forouzan: chapter 10 | Kaufman: chapter 6
- Handouts
- Links
- RSA Security (the company started by the creators of the RSA algorithm)
- Detailed description and example of RSA from David Ireland. The site also has nice coverage of other aspects of security, including a detailed proof of RSA.
- Another RSA example using larger numbers
- Homepage of Ron Rivest, co-inventor of RSA, RCx, MD5, etc.
- Bruce Schneier's website. Details on many protocols, algorithms, products and attacks. Schneier is a well-known security researcher, with popular books on security.
- Lecture Notes
- PDF | MP3: Part 1, Part 2, Part 3 | Video: part 1, part 2, part 3
- Readings
-
Stallings: chapter 11 | Forouzan: chapter 11/12 | Kaufman: chapter 5
- Handouts
- Links
- Lecture Notes
- PDF | MP3: Part 1, Part 2 | Video: part 1
- Readings
-
Stallings: chapter 12 | Forouzan: chapter 11/12 | Kaufman: chapter 5
- Lecture Notes
- none (covered in Hash and MAC functions)
- Readings
-
Stallings: chapter 13 | Forouzan: chapter 11/12 | Kaufman: chapter 5/6
- Lecture Notes
- PDF | MP3: Part 1, Part 2, Part 3, Part 4 | Video: part 1, part 2, part 3
- Readings
-
Stallings: chapter 14 | Forouzan: chapter 15 | Kaufman: chapter 15
- Links
- Lecture Notes
- PDF | MP3: Part 1, Part 2 | Video: part 1, part 2
- Readings
-
Stallings: chapter 15/20 | Forouzan: chapter 14 | Kaufman: chapter 9/10
- Links
- Lecture Notes
- PDF | MP3: Part 1 | Part 2 | Part 3 | Video: part 1, part 2
- Readings
-
Stallings: chapter 16 | Forouzan: chapter 17/18 | Kaufman: chapter 19
- Handouts
- HTTPS packet capture - trace of packets captured using tcpdump when access a web server by standard HTTP as well as using HTTPS
- SSH packet capture - trace of packets captured using tcpdump when connecting to SSH server
- Links
- OpenSSL: toolkit/library for implementing SSL/TLS, as well as generic cryptography functions
- OpenSSL Programming Examples: gives example C source code and articles decribing how OpenSSL can be used to create secure client/server applications.
IPsec is not covered in detail this year; you can find an explanation of IPsec in the textbook.
Readings
Stallings: chapter 19 | Forouzan: chapter 17/18 | Kaufman: chapter 17/18
Links
Firewalls are not covered in detail this year; you can find an explanation of firewalls in the textbook.
- Readings
-
Stallings: chapter 22 | Forouzan: - | Kaufman: chapter 23
- Lecture Notes
- PDF | MP3: Part 1 | Part 2 | Video: part 1, part 2
- Readings
-
Stallings: chapter 21 | Forouzan: - | Kaufman: -
- Links
Return to: CSS322 Home | Course List | Steven Gordon's Home | SIIT