IT Security (S2, 2015)

Cryptography

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes. You can also download a printable PDF of the notes from last year.

Substitution cipher example Transposition cipher example Concept of brute force attack Brute force on DES and speeds Confidentiality with Encryption and Attack Data Integrity with Encryption and Attack 1 Data Integrity with Encryption and Attack 2 Source Authentication with Encryption and Attack Public Key Crypto and Symmetric Key Crypto

Return to: Course Home | Course List | Steven Gordon's Home | SIIT