University of Cincinnati Logo

20-CS-6053 - Network Security
Electrical Engineering & Computer Science

Lecture Notes Week
    Motivation     16 Jan
    Security, Network Basics and Firewalls     18 Jan
    TCP/IP     reference
    IP address spoofing     reference
    IP Fragmentation     reference
    Secret & Public Key Block Ciphers     ?
    Merkle-Hellman encryption     28 Jan
    Merkle-Hellman Demonstration     reference
    Mod arithmetic     28 Jan, 1 Feb, 3 Feb
    Mod Inverse     28 Jan
    Chinese Remainder Theorem     1 Feb
    Lab 1     23 Jan
Some Odd Ciphers    
Logic operations:     applet     source
Simple xor:     applet     source
25 Jan
Double lock:     applet     source
25 Jan
Crack double lock:     applet     source
25 Jan
Better double lock:     applet     source
25 Jan
Public Key Cryptosystems    
    Diffie-Hellman Key Exchange     8 Feb reference
           - Use of BigInteger, pow, mod, modPow to
        implement Diffie-Hellman reference
           - Make DH public key, save to file DHKey reference
           - Make send/receive public key from DHKey reference
           - Receive client public key, make secret,
     send server public key reference
           - Send public key to server, receive server
         public key, make secret
        Karn+Diffie-Hellman reference
RSA     6 Feb reference reference reference reference reference reference
        The above in a tarball reference
DSS     11 Feb
Elliptic Curve Cryptosystem     11 Feb
Message Digest - Auth, Integ, Encrypt    
Hashing     8 Feb
    SHA-xxx Description     13 Feb
    SHA-1 Broken     reference
    Hash Collisions (birthday problem)     13 Feb
    MessageDigest class in Java reference
       - java source
    Message authentication class and tests reference
    Server authentication class and tests reference
    Encryption/decryption classes and tests reference
    SHA-1 Implementation     reference
    SHA-2 Implementation     reference
    SHA-3 Implementation     reference
    HMAC Implementation     reference
Karn Symmetric Key Algorithm     6 Feb reference reference reference
Karn and Diffie-Hellman in one applet     reference
Block Ciphers and Secret Key Cryptosystems    
    Sending Sequence of Encrypted Blocks     15 Feb
    DES, IDEA, AES     20 Feb
    DES     20 Feb (IDEA multiply)     reference
    AES code     reference
    AES Specification     reference
Stream Ciphers and Authentication Protocols    
Stream Ciphers     25 Feb
Interactive Zero-Knowldege Proofs and Authentication 18 Feb
Password Authentication and KDCs, and CAs     4 Mar
How to make certificates using openssl     reference
Authentication, Key Distribution Pitfalls     1 Mar
Systems for Authentication and Session Management    
       Tutorial     User Guide
    Unix How To     Cisco overview
Layer 4.5 Systems    
Email Security    
Side Channel Attacks    
Lecture:     general, timing, power
Tutorial:     introduction
Web:     TEMPEST     Declassified 1972 NSA paper
Paper:     branch prediction
Slides:     differential power
Paper:     differential power
Paper:     timing
Paper:     differential fault analysis
Paper:     monitor eavesdropping: Optical
Paper:     monitor eavesdropping: EM
Mathematics of Cryptography    
    Basics details     ?? (from P.63)
    Modulo Product: applet     ??
    Diffie-Hellman Demonstration: applet     ??
    Groups and generators: applet     ??
    Fermat's Little Theorem: applet     ??
    Exponents/Roots: applet     ??
    Square root modulo a prime: applet     ??
    Miller-Rabin Primality Test: applet     ??
    Z*n: applet     ??
    Mod inverse: applet     --
    Chinese Remainder Theorem: applet     --
    Mod inverse: xx xxx   bigint.h
    Mod multiplication: xx xxx   bigint.h
    Exponentiation: xx xxx   bigint.h   power.h   Makefile   stacker.h
RSA:     applet     source
xx xxx
Hash: input pair maps to same output     xx xxx
SHA algorithms     xx xxx
SHA Cracked xx xxx
Message Digest Java Code     xx xxx
Cryptographically secure random number     xx xxx
Man-in-the-Middle/Impersonation     xx xxx
Paul Erdos
Ladies on Campus
Oscar Robinson