University of Cincinnati Logo
 

20-CS-5153 - Network Security
Electrical Engineering & Computer Science

   
Lecture Videos Date
    Motivation and overview        Jan 13, 2017
    Firewalls, Merkle-Hellman encryption        Jan 18, 2017
    Multiplicative inverse, Finding a prime number        Jan 20, 2017
    Block cipher transmission of large messages        Jan 23, 2017
    Message Integrity, DES, 3DES        Jan 25, 2017
    IDEA and AES        Jan 27, 2017
    Hashing        Jan 30, 2017
    Diffie-Hellman key exchange        Feb 1, 2017
    Signing, DSS, RSA, CRT, Euler's Totient Function        Feb 3, 2017
    Lab 2, Zero Knowledge Proofs        Feb 6, 2017
    Zero Knowledge Proofs        Feb 8, 2017
    Elliptic curve crypto        Feb 10, 2017
    Stream Ciphers        Feb 13, 2017
    RC4, Password Authentication        Feb 15, 2017
    Strong passwords, SPEKE, Key Distribution, Certification Authorities        Feb 17, 2017
    Authentication handshake pitfalls        Feb 20, 2017
    Public Key mutual authentication, Needham-Schroeder, Kerberos        Feb 22, 2017
    IPSec I        Feb 24, 2017
    IPSec II, Lab 3        Feb 27, 2017
    Public Key Infrastructure        Mar 1, 2017
    SSL/TLS        Mar 3, 2017
    Contest Project        Mar 6, 2017
    SSL        Mar 8, 2017
    Side Channel Attacks        Mar 10, 2017
    Android: an Example        Mar 27, 2017
    Android: Game Example        Mar 29, 2017
    Android: keytool        Mar 31, 2017
    Android: Security        Apr 3, 2017
    Android: Lab 5        Apr 5, 2017

    Motivation and overview        Jan 11, 2016
    Overview and Mod Arithmetic        Jan 13, 2016
    Lab 1, Block Cipher Transmission        Jan 20, 2016
    Block Encryption (DES,IDEA)        Jan 25, 2016
    AES, Hashing, Message Digest        Jan 27, 2016
    SHA, Diffie-Hellman        Feb 1, 2016
    RSA, Elliptic Curve Cryptography, Prime Number Generation        Feb 3, 2016
    Lab 2, Zero Knowledge Authentication        Feb 8, 2016
    Authentication Protocols, KDCs, CAs        Feb 15, 2016
    Authentication Protocol Pitfalls        Feb 17, 2016
    Openssl and Certificates, Lab 3        Feb 22, 2016
    Kerberos, PKI        Feb 24, 2016
    SSH        Mar 2, 2016
    Project, SSL        Mar 7, 2016
    SSL/TLS, discussion        Mar 9, 2016
    Side channel attacks        Mar 16, 2016
    Android OS, Contest Prep        Mar 28, 2016

    Motivation and overview        Jan 7, 2014
    Firewalls, encryption overview, Merkle-Hellman        Jan 9, 2014
    Lab 2, GCD, Chinese Remainder Theorem, multiplicative inverse        Jan 14, 2014
    AES, hashing, message digest        Jan 30, 2014
    Karn + Diffie-Hellman, Lab 3        Feb 4, 2014
    RSA, DSS, Elliptic Curve Crypto        Feb 6, 2014
    Zero Knowledge Authentication        Feb 11, 2014
    Stream Ciphers        Feb 13, 2014
    Authentication protocols, KDCs, CAs        Feb 18, 2014
    IPSec and IKE        Feb 27, 2014
    SSH and SSL/TLS        Mar 4, 2014
    Email security        Mar 6, 2014
    Introduction to Android OS        Mar 24, 2014
    Android tools        Apr 1, 2014
    Eclipse example, Android malware        Apr 3, 2014
    Google Play, code samples        Apr 8, 2014
    Review        Apr 17, 2014
 
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson