Friday, November 20, 2009

Computer Security Lectures

There are a total of 14 lectures of Computer Security, though lectures are numbered to sixteen - lectures 8 and 13 don't exist.

These lectures were taught and conducted by teachers:
  1. Najm-ul-Islam Farooqui
  2. Ibrahim Muhammad Hussain
This course outline is subject to be affective for batch 2006, i.e. it may or may not change for others:
Computer Security Course Outline
Lecture one consists of introduction, history, background and issues of computer security to give you a head start for the rest of the course:
Computer Security Lecture 01

Lecture two is dedicated to the basic and introductory level of cryptology and all that is there in it, focussing mainly on classical encryption algorithms:
Computer Security Lecture 02

This lecture emphasizes only Simplified Data Encryption Standard (S-DES) which is used to get you familiar with the current computer security standards at a beginner's level:
Computer Security Lecture 03

After S-DES comes DES (i.e. without the S) for in-depth view of its algo. which has been a current standard only not too long ago and has only been replaced by new standards in the late 1990's:
Computer Security Lecture 04

A very short chapter (though article is more suitable for calling it) that only focuses on differenciating between Differential and Linear Cryptanalysis:
Computer Security Lecture 05

International Data Encryption Algorithm (IDEA) is another, new age, defacto algorithm to which this lecture is dedicated:
Computer Security Lecture 06

Though IDEA is defecto standard, this lecture introduces you to the Advance Encryption Standard (AES), the accepted standard, and teaches you substition, S-Box, Mix-Columns, Add Round Key and all etc.:
Computer Security Lecture 07

To give you a clear and elaborate understanding about the working of AES rounds, view the following animation. Change the file extention to .exe before opening the file.
Download Animation Here
An another short lecture (or rather topic) introducing to you the number theory; Primes numbers, Relatively prime numbers, GCD (greatest common divisor), Fermat's Theorem and Primitive roots:
Computer Security Lecture 09

Elaboration of  Public Key Cryptography and RSA with all the working and logic to get you at the end of understanding the Asymmetric algorithms:
Computer Security Lecture 10

Cryptography in connection to Network Security is the objective of this lecture, and also outlines Diffie-Hellman Key-Exchange protocol:
Computer Security Lecture 11

Message Authentication and Hash Functions are the main ingredients of this lectue, includes Data Authentication Algorithm (DAA):
Computer Security Lecture 12

This lecture teaches you the Digital Signatures' properties, techniques and types (i) RSA approach  (ii) DSS approach:
Computer Security Lecture 14

Email security - Pretty Good Privacy (PGP) is discussed in this chapter which is pretty much all the way theory:
Computer Security Lecture 15

IPSec (IP Security) is another theoritical lecture, includes topics of transport and tunnel mode of operations, Authentication Header (AH) and Encapsulatin Security Payload (ESP):
Computer Security Lecture 16


Lecture of  Firewall was not included slides were made available for our own refference and good:
Firewall Slides

No comments:

Post a Comment

Please don't trash the comment area with irrelevent blabber.