Security in Computer Networks
This class lecture covers the following topics:
- Security Requirements
- Secret Key Encryption
- Secret Key: A Simple Example
- Block Encryption
- Cipher Block Chaining (CBC)
- Data Encryption Standard (DES)
- Advanced Encryption Standard (AES)
- Secret Key Encryption: Review
- Public Key Encryption
- Public Key Encryption
- Public Key Encryption Method
- Modular Arithmetic
- RSA Public Key Encryption
- RSA Algorithm: Example
- Confidentiality and Non-Repudiation
- Public Key Encryption: Review
- Hash, Signatures, Certificates
- Hash Functions
- MD5 Hash
- SHA-1 Algorithm
- Message Authentication Code (MAC)
- Digital Signature
- Digital Certificates
- Oligarchy Example
- Sample X.509 Certificate
- End Point Authentication
- Hashes, Signatures, Certificates
- Secure Email
- Secure E-Mail
- Signed Secure E-Mail
- Pretty Good Privacy (PGP)
- Lab 8: Secure e-mail
- Secure Email: Review
- Transport Layer Security (TLS)
- Web Traffic Security Approaches
- History
- SSL/TLS Architecture
- SSL/TLS Handshake Protocol
- SSL/TLS Handshake Protocol Actions
- Cryptographic Computations
- SSL/TLS Change Cipher Spec Protocol
- SSL/TLS Alert Protocol
- SSL/TLS Record Protocol Services
- SSL/TLS Record Protocol Operation
- Secure HTTP (HTTPS)
- TLS: Summary
- IP Security (IPsec) and VPNs
- IP Security
- IP Security Applications
- IP Security Architecture
- Security Association Database (SAD)
- Security Policy Database (SPD)
- IPsec
- Tunnel vs. Transport Mode
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- IPsec Key Management (IKE)
- Summary: IPsec
- Firewalls and IDS
- What is a Firewall?
- Firewalls - Packet Filters
- Firewalls - Packet Filters
- Packet Filter Example: Windows Firewall
- Firewalls - Stateful Packet Filters
- Proxy Servers
- Application Level Gateway (Cont)
- DMZ Networks
- Firewall Limitations
- Intrusion vs. Extrusion Detection
- Types of IDS
- Honeypots
- Firewalls and IDS: Summary
- Ron's Cipher 4 (RC4)
- Extensible Authentication Protocol (EAP)
- RADIUS
- Wired Equivalent Privacy (WEP)
- Problems with WEP Authentication
- 802.11i Wireless LAN Security
- Authentication and Key Derivation
- WPA2 Four-Way Handshake
- Authentication and Key Management in 4G/5G
- Acronyms
- Summary
Presentation slides in Adobe Acrobat Format:
1 slide/page
View Slides+Video: (
Part 1*,
Part 2*,
Part 3*,
Part 4)
*WUSTL students, please watch the video on Canvas to get credit.
Right Click and save to download Slides+Video (
Part 1,
Part 2,
Part 3,
Part 4
) podcast.
Questions & Answers session:
Revised Slides with Q&A.
View Q&A videos (
Part 1,
Part 2,
Part 3,
Part 4
)
Right Click and save to download Q&A videos for local viewing (
Part 1,
Part 2,
Part 3,
Part 4
)
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Frequently asked questions about remote audio/video viewing
Back to Raj Jain's Home Page