University of Cincinnati Logo
 

20-CS-6053 - Network Security
Electrical Engineering & Computer Science

   
Lecture Notes Week
    Motivation     16 Jan
    Security, Network Basics and Firewalls     18 Jan
    TCP/IP     reference
    IP address spoofing     reference
    IP Fragmentation     reference
    Secret & Public Key Block Ciphers     ?
    Merkle-Hellman encryption     28 Jan
    Merkle-Hellman Demonstration     reference
    Mod arithmetic     28 Jan, 1 Feb, 3 Feb
    Mod Inverse     28 Jan
    Chinese Remainder Theorem     1 Feb
    Lab 1     23 Jan
 
Some Odd Ciphers    
Logic operations:     applet     source
reference
Simple xor:     applet     source
25 Jan
Double lock:     applet     source
25 Jan
Crack double lock:     applet     source
25 Jan
Better double lock:     applet     source
25 Jan
 
Public Key Cryptosystems    
    Diffie-Hellman Key Exchange     8 Feb
        DH.java reference
           - Use of BigInteger, pow, mod, modPow to
        implement Diffie-Hellman
        DHKeyWriter.java reference
           - Make DH public key, save to file DHKey
        DiffieHellmanExchange.java reference
           - Make send/receive public key from DHKey
        DH_Server.java reference
           - Receive client public key, make secret,
     send server public key
        DH_Client.java reference
           - Send public key to server, receive server
         public key, make secret
        Karn+Diffie-Hellman reference
RSA     6 Feb
        rsa.cc reference
        RSA.java reference
        PubRSA.java reference
        MakeCertificate.java reference
        MakePlayerCert.java reference
        CheckCert.java reference
        The above in a tarball reference
DSS     11 Feb
Elliptic Curve Cryptosystem     11 Feb
 
Message Digest - Auth, Integ, Encrypt    
Hashing     8 Feb
    SHA-xxx Description     13 Feb
    SHA-1 Broken     reference
    Hash Collisions (birthday problem)     13 Feb
    MessageDigest class in Java reference
       - java source
    Message authentication class and tests reference
    Server authentication class and tests reference
    Encryption/decryption classes and tests reference
    SHA-1 Implementation     reference
    SHA-2 Implementation     reference
    SHA-3 Implementation     reference
    HMAC Implementation     reference
Karn Symmetric Key Algorithm     6 Feb
        KarnTestClient.java reference
        KarnTestServer.java reference
        Karn.java reference
Karn and Diffie-Hellman in one applet     reference
 
Block Ciphers and Secret Key Cryptosystems    
    Sending Sequence of Encrypted Blocks     15 Feb
    DES, IDEA, AES     20 Feb
    DES     20 Feb
       inverses.cc (IDEA multiply)     reference
    AES code     reference
    AES Specification     reference
 
Stream Ciphers and Authentication Protocols    
Stream Ciphers     25 Feb
Interactive Zero-Knowldege Proofs and Authentication 18 Feb
Password Authentication and KDCs, and CAs     4 Mar
How to make certificates using openssl     reference
Authentication, Key Distribution Pitfalls     1 Mar
 
Systems for Authentication and Session Management    
Kerberos
       Tutorial     User Guide
    Unix How To     Cisco overview
    Specification
PKI    
IPSec    
IKE    
 
Layer 4.5 Systems    
SSL/TLS    
SSH    
 
Email    
Email Security    
 
Side Channel Attacks    
Lecture:     general, timing, power
Tutorial:     introduction
Web:     TEMPEST     Declassified 1972 NSA paper
Paper:     branch prediction
Slides:     differential power
Paper:     differential power
Paper:     timing
Paper:     differential fault analysis
Paper:     monitor eavesdropping: Optical
Paper:     monitor eavesdropping: EM
 
Mathematics of Cryptography    
    Basics details     ?? (from P.63)
    Modulo Product: applet     ??
    Diffie-Hellman Demonstration: applet     ??
    Groups and generators: applet     ??
    Fermat's Little Theorem: applet     ??
    Exponents/Roots: applet     ??
    Square root modulo a prime: applet     ??
    Miller-Rabin Primality Test: applet     ??
    Z*n: applet     ??
    Mod inverse: applet     --
    Chinese Remainder Theorem: applet     --
explanation
    Mod inverse: xx xxx
       inverse.cc   bigint.cc   bigint.h
    Mod multiplication: xx xxx
       modulo.cc   bigint.cc   bigint.h
    Exponentiation: xx xxx
       primes.cc   bigint.cc   bigint.h   stacker.cc
       power.cc   power.h   Makefile   stacker.h
RSA:     applet     source
xx xxx
Hash: input pair maps to same output     xx xxx
SHA algorithms     xx xxx
SHA Cracked xx xxx
Message Digest Java Code     xx xxx
 
Cryptographically secure random number     xx xxx
Man-in-the-Middle/Impersonation     xx xxx
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson