Cryptography and Computer Network Security

Up

Please, make sure to reload this page to see its most recent version.
 

Slides from Fall 2010

Lecture 12 - Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 11 - Hash Functions & MACs.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 10 - RSA Implementation: Efficient encryption, decryption & key generation.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 9 - RSA: Genesis, Operation & Security. Factoring in Software & Hardware.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 8 - IDEA and RC5. Modes of Operation of Block Ciphers.

2 slides per page   3 slides per page

 

 
Lecture 7 - Towards Modern Ciphers. DES and Its Extensions.

2 slides per page     3 slides per page     6 slides per page

 

 
Facts & Myths of Enigma by Arkadiusz Or³owski & Kris Gaj
presentation from Eurocrypt 2003 in Warsaw, Poland

2 slides per page   6 slides per page

 

Lecture 6 - Historical Ciphers.

2 slides per page   3 slides per page

 

Lecture 5 - Algorithms for GCD, Multiplicative Inverse, and Solving Linear Congruences.

2 slides per page   3 slides per page

 

Lecture 4 - Key Management. Pretty Good Privacy.

2 slides per page   3 slides per page

 

Lecture 3 - Types of Cryptosystems. Implementation of Security Services.

2 slides per page   3 slides per page

 

Lecture 2 - Basic Concepts of Cryptology.

2 slides per page   3 slides per page

 

Lecture 1 - Mathematical Background: Modular Arithmetic.

2 slides per page   6 slides per page

 

Lecture 0 - Organization of the Course.

 

Slides for this semester will be posted gradually, one day before the given lecture.
If you are not able to wait until a new set of slides is posted,
please print and bring to class a corresponding set from the previous year, available below under
Slides from Fall 2009.

 

Slides from Fall 2009

Lecture 12 - Security Protocols. Cryptographic Standards. Companies Developing Cryptographic Hardware.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 11 - Hash Functions & MACs.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 10 - RSA Implementation: Efficient encryption, decryption & key generation.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 9 - RSA – Genesis, Operation & Security. Factoring in Software and Hardware.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 8 - Modes of Operation of Block Ciphers. RC5 and IDEA.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 7 - Towards Modern Ciphers. DES and Its Extensions.

2 slides per page     3 slides per page     6 slides per page

 

Lecture 6 - Historical Ciphers.

2 slides per page   3 slides per page

 

Lecture 5 - Mathematical Background: Modular Arithmetic.

2 slides per page   3 slides per page

 

Lecture 4 - Key Management. Pretty Good Privacy.

2 slides per page   3 slides per page

 

Lecture 3 - Types of Cryptosystems. Implementation of Security Services.

2 slides per page   3 slides per page

 

Lecture 2 - Basic Concepts of Cryptology.

2 slides per page   3 slides per page


Lecture 1 - Basic Security Services.

Lecture 0 - Organization of the Course.