Computer and Network Security
Computer and Network Security
by
Avinash Kak
Think of these lecture notes as a living textbook that strives to strike a balance between
the systems-oriented issues and the cryptographic issues. Without the latter, many
aspects of the former cannot be fully comprehended, and, without the former, the latter
are too dry to appreciate.
When I teach the theoretical portions of this course, I actually work out the formulas
on the chalkboard and, when I do so, I follow the derivations presented in these lecture notes. On the other hand,
when I teach the systems portion of the course, I spend quite a bit of time demonstrating the issues on my Linux
laptop, again in the manner described in these lecture notes. These lecture notes are intended as much for
showing in class in the form of slides as they are for focused reading by the students on their own. When used as
slides, these serve as backdrop to the explanations provided on the chalkboard or through demonstrations on a
computer.
IMPORTANT: Your email request for this material must establish two things: that you are an instructor
and that you are using these lecture notes to teach your class. An anonymous email request (using, say, a gmail or
a yahoomail address) that does not indicate your institutional affiliation will be ignored.
for hash functions (see Lecture 15 for an example) and for writing scripts for
block and stream ciphers.
2. The BitVector class in Perl that lets you do everything in Perl that the above
or for course projects, you will find the book "Scripting with Objects" a
useful resource for this course. Chapters 2 and 3 of the book provide quick and easy-tofollow introductions to Perl and Python, respectively.
4. If you'd rather do your homework in C++ or Java, you will find the book
"Programming With Objects" a useful resource. This book is now being used
at a number of universities for teaching object-oriented programming in both
C++ and Java simultaneously.
If you would like to know about the OBJECTS TRILOGY PROJECT that led to the
two books mentioned above, click here.
The third book in the Objects Trilogy is:
downloa
Updated: Janu
downloa
Updated: Janu
ing Block and Stream Ciphers for Secure Wired and WiFi
mmunications
downloa
Updated: Febru
downloa
Updated: Febru
downloa
Updated: Ap
downloa
Updated: Febru
downloa
downloa
Updated: Febru
downloa
Updated: Febru
downloa
Updated: Febru
downloa
Updated: Febru
downloa
Updated: Mar
downloa
Updated: Mar
downloa
Updated: Mar
downloa
downloa
Updated: Mar
downloa
downloa
Updated: Ap
downloa
downloa
downloa
downloa
Updated: Apr
Updated: Ap
downloa
downloa
ex (HTML)
Updated: Ap
appearance on the web in 2006. They have so far gone through eight revisions. With each
revision I have attempted to improve the explanations on the basis of the feedback I receive
from the students at Purdue and from other users of these notes. Regarding the notes that
deal with the systems side of security, I have continually endeavored to find the best ways to
combine the explanation of the concepts involved and their demonstration on a laptop
keeping in the mind the time constraints of a typical lecture period.
HOW CAN YOU BE SURE YOU HAVE THE LATEST UPDATED VERSION OF A
LECTURE: As I am thinking about the material and teaching it in class, a lecture may go
through as many as a dozen updates. If you are tracking my updates, the only way you can
be certain you have the final version of an updated lecture is to check at the end of April
when I am usually done with all the updating. When I am done, I post a notice to that effect
on Twitter.
EXPERIENCING PROBLEMS? If you experience any problems with downloading or
using any of these PDF files, please send an email to [email protected] with the string
"Problem with computer security notes" in the subject line to get past my spam filter.
FEEDBACK WELCOME! If you have any comments or any suggestions for improving
these notes, please send an email to [email protected] with the string "Comments on
computer security notes" in the subject line to get past my spam filter. Any suggestions that
I incorporate would be duly acknowledged.
WOULD YOU LIKE TO CONTRIBUTE A HOMEWORK PROBLEM OR A
PROJECT? My goal is for these notes to become self-contained as a medium of instruction
in computer and network security. Toward that end, I'd like to end the notes for each lecture
on a set of homework problems and/or projects. If you send me a problem or a project, your
name will be mentioned as the author of that problem or project. If you submit a project,
please make sure that it can be done in one or two weeks' time in some high-level language.
I'll certainly include the problems and projects I currently give out when teaching this
material, but any contributions made by others using these lecture notes would add to the
variety. If you choose to send me a problem or a project, email it to [email protected] with
the string "homework for computer security notes" in the subject line.
SAVE THIS INFORMATION IN A SAFE PLACE: If you are a frequent user of this
material, note that occasionally the web server hosting this material may be down for system
maintenance. If you cannot access this material but you have an urgent need to do so, send
an email immediately to [email protected] with the string "Unable to access computer
security notes" in the subject line to get past my spam filter. I should be able to provide you
with a URL to another web server hosting this material.