Security in Computer Networks
This class lecture covers the following topics:
- Security Requirements
- Secret Key Encryption
- Secret Key: A Simple Example
- Block Encryption
- Cipher Block Chaining (CBC)
- Data Encryption Standard (DES)
- Advanced Encryption Standard (AES)
- Secret Key Encryption: Review
- Public Key Encryption
- Public Key Encryption
- Public Key Encryption Method
- Modular Arithmetic
- RSA Public Key Encryption
- RSA Algorithm: Example
- Confidentiality and Non-Repudiation
- Public Key Encryption: Review
- Hash, Signatures, Certificates
- Hash Functions
- MD5 Hash
- SHA-1 Algorithm
- Message Authentication Code (MAC)
- Digital Signature
- Digital Certificates
- Oligarchy Example
- Sample X.509 Certificate
- End Point Authentication
- Hashes, Signatures, Certificates
- Secure Email
- Secure E-Mail
- Signed Secure E-Mail
- Pretty Good Privacy (PGP)
- Lab 8
- Secure Email: Review
Presentation slides in Adobe Acrobat Format:
1 slide/page
| 4 slides/page
View Slides+Video: Part 1:
WUSTL* or
YouTube|
Part 2:
WUSTL* or
Youtube
*WUSTL playback includes a table of contents symbol at the bottom that allows jumping directly to any slide in the video.
Right Click and save to download Slides+Video (
Part 1,
Part 2) podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page