IT Security (S2, 2013)

Cryptography

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.

Caesar Cipher Example 1 Caesar Cipher Example 2 Rail Fence Cipher Example Vigenere Cipher 1 Authentication with Symmetric Encryption - Normal Authentication with Symmetric Encryption - MaliciousAuthentication with Hash Function - Normal Case Authentication with Hash Function - Attack 1 Authentication with Hash Function - Attack 2 Authentication with Public Key Crypto Digital Signature Normal Operation Digital Signature Masquerade Attack Digital Signature Modification Attack

Return to: Course Home | Course List | Steven Gordon's Home | SIIT