University of Cincinnati Logo
 

20-CS-6053 - Network Security
Electrical Engineering & Computer Science

Additional Notes
   
    Thousands of threads in Java
    Hosting backdoors in hardware
    "The Online Threat" from the New Yorker
    SHA-X specs
    Attack on AES - polynomials
    Attack on AES - titled
    Internet Control Message Protocol
    IP Offloading in Windows
    Internet Protocol, links to RFCs
    TCP/IP
   
AIM Client      Server.java      host.html
HostIP.java      hostip.jar     
   
JPCap      (Packet Capture Classes in Java)      Package (tar file)
    IPSec: Overview
    The ESP CBC-Mode Cipher Algorithms, RFC 2451
    Security Architecture for the Internet Protocol, RFC 2401
    IP Authentication Header, RFC 2402
    The Use of HMAC-MD5-96 within ESP and AH, RFC 2403
    The Use of HMAC-SHA-1-96 within ESP and AH, RFC 2404
    The ESP DES-CBC Cipher Algorithm With Explicit IV, RFC 2405
    IP Encapsulating Security Payload (ESP), RFC 2406
    TheInternet IP Security Domain of Interpretation for ISAKMP, RFC 2407
    ISAKMP, RFC 2408
    The Internet Key Exchange (IKE), RFC 2409
    The NULL Encryption Algorithm and Its Use With IPsec, RFC 2410
    IP Security Document Roadmap, RFC 2411
    SSL Specification
    X.509 Certificate Specification
    LDAP Secification
    Timing attack on SSL (postscript)
    SSH Protocol Assigned Numbers (RFC 4250)
    SSH Protocol Architecture (RFC 4251)
    SSH Transport Layer Protocol (RFC 4253)
    SSH Authentication Protocol (RFC 42562)
    SSH Connection Protocol (RFC 4254)
    SSH Session Channel Break Extension (RFC 4335)
    SSH Transport Layer Encryption Modes (RFC 4344)
    Privacy Enhanced Mail (RFC 1421)
    ARPA Internet Text Messages (RFC 822)
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson