Security in Computer Networks
This lecture covers the following topics:
- Security Requirements
- Secret Key Encryption
- Secret Key Encryption
- Secret Key: A Simple Example
- Block Encryption
- Cipher Block Chaining (CBC)
- DES and 3DES
- Advanced Encryption Standard (AES)
- Ron's Cipher 4 (RC4)
- Key Distribution
- Secret Key Encryption: Review
- Home Exercises
- Homework 8A
- Public Key Encryption
- Public Key Encryption
- Public Key Encryption Method
- Modular Arithmetic
- RSA Public Key Encryption
- RSA Algorithm: Example
- Homework 8B
- Confidentiality
- Diffie-Hellman Key Agreement
- Hash Functions
- MD5 Hash
- SHA-1 Algorithm
- Message Authentication Code (MAC)
- Digital Signature
- Digital Certificates
- Oligarchy Example
- Sample X.509 Certificate
- Public Key Encryption: Review
- Review Exercises
- IPSec, VPN, Firewalls
- IPSec
- Tunnel vs. Transport Mode
- Authentication Header
- AH ICV Computation
- ESP Packet
- Encapsulating Security Payload (ESP)
- Homework 8C
- What is a VPN?
- PPTP
- Firewall
- Application Gateways: Proxy Servers
- Types of IDS
- Signature Based IDS
- IPSec, VPN, Firewalls: Review
- Review Exercises
- Secure Email, SSL, IKE,WEP
- Secure E-Mail
- Pretty Good Privacy (PGP)
- SSL
- Handshake Protocol
- IKE Phases
- IKE Modes and Authentication Methods
- Wired Equivalent Privacy (WEP)
- WEP Details
- WEP Encapsulation
- WEP Decapsulation
- WEP Authentication
- WEP Review
- Problems with WEP Authentication
- Secure Email, SSL, IKE,WEP: Review
- Review Exercises
- Homework 8D
Presentation slides in Adobe Acrobat Format:
1 slide/page
Slides + Audio: Part 1,
Part 2
(Using Flash and JavaScript)
Slides+Audio (
Part 1,
Part 2
)
Right click and save to download
Slides+Audio (
Part 1,
Part 2
) podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page