CSCI 6268: Foundations of Computer and Network Security

Lecture Notes

This page contains lecture notes and other material that is relevant to the course.

Nov 20: Documentation on StackGuard is available here. Documentation on Splint is available here.

Nov 7: The Snort network intrusion detection system is available on-line at www.snort.org. A user manual is also available from the same site.

Nov 6: The following two articles explain some of the vulnerabilities of WEP. The first article also contains a short description of WEP.

  1. N. Borisov, I. Goldberg, and D. Wagner, Intercepting Mobile Communications: The Insecurity of 802.11, In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, July, 2001.
  2. S. Fluhrer, I. Mantin, and A. Shamir, Weaknesses in the Scheduling Algorithm of RC4, In Eight Annual Workshop on Selected Areas in Cryptography, August, 2001.
An exploitation of the attack described by Fluhrer, Mantin, and Shamir is described by Stubblefield, Ioannidis, and Rubin here.

Nov 2: Small set of notes on ssl and client/server computing, and a simple example of a client/server application.

Oct 17: Notes for the History, Law, and Policy lecture can be found here.

Sep 24: The previous set of notes has now been augmented to contain some details on RSA encryption as well as the prior stuff on groups.

Sep 19: Some supplemental notes on groups and number theory by John.

Sep 12: Some supplemental notes from Modes and Hashing lecture by John.

Sep 5: There is a detailed report available on the AES selection process if you want more details of how Rijndael was chosen.

Sep 3: Some supplemental notes from DES lecture by John.

this page is maintained by Antonio Carzaniga