IT Security (S2, 2014)

Cryptography

Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes.

Simple Brute Attack Example Example of Known Plaintext Confidentiality and Authentication with Symmetric Key Ciphers Hash Collisions Authentication with Hash Functions - Attack 1 Authentication with Hash Functions - Attack 2 Public Key Cryptography for Confidentiality Public Key Cryptography for Authentication Digital Signature Example 1 Digital Signature Example 2 Shared Secret Key with Public Key Cryptography

Return to: Course Home | Course List | Steven Gordon's Home | SIIT