IT Security (S2, 2013)
Cryptography
Lecture Material
- Lecture Notes: View, Print
- Simple Introduction to Using OpenSSL on the Command line: View, Print
- Public Key Encryption and Digital Signatures using OpenSSL: View, Print
- Brute Force of DES and AES: View, Print
- Cryptography Assumptions and Principles Summary
Readings
- Computer Security by Stallings and Brown: chapter 2, (20, 21)
- Cryptography and Network Security by Stallings: chapter 2, 3, 7, 9, 11, 12, 13, 14
- Network Security by Kaufman, Perlman and Speciner: chapter 2, 3, 4, 5, 6
- Cryptography and Network Security by Forouzan: chapter 5, 6, 10, 11, 12
- Security Engineering by Anderson: chapter 5
- Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone: chapter 1 (entire book)
Videos
Notes
Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.
Return to: Course Home | Course List | Steven Gordon's Home | SIIT