810:088 Topics: Network Security (Summer 2004)

DOWNLOAD for June 22nd class.

Might want to Use MOZILLA in the CEEE lab instead of KONQUEREOR

It respects the HTML P paragraph tag.
It shows .txt files with a fixed-width font in the browser window. Use the K menu, Start Command and type Mozilla.


  1. Secrets and Lies - Digital Security in a Networked World by Bruce Schneier

  2. Cryptography Decrypted by H. X. Mel, Doris M. Baker

Last years page: Summer of 2003 (July) Network Security class web site.
Some links to explore on networks and security issues.

Internet Security Glossary.

Another helpful glossary of Internetworking Terms and concepts. This LAN is your LAN.

  1. IP numbers and BINARY (base 2), along with base 16 (hexadecimal) number system.

  2. Subnet masks and IP numbers used to break networks like uni.edu ( down into different subnetworks so ROUTING can still be done WITHIN uni.edu.

  3. Know the OSI 7 Layer model. And also.... Vip... Please Do Not Throw Sausage Pizza Away! :-)

  4. Slides: Chapter 11 IP, subnet masks portion. (You do NOT have this textbook, but the slides are a good summary of the concepts for this summer's Network Security class and supplement to our class lectures and discussions).

    Slides: Chapter 11 IP, subnet masks for OLDER BROWSERS and CEEE lab

  5. How strong was the DES encryption in 1975? How fast was it broken only 23 years later? DES encryption is weak now. See Moore's Law and DES from the textbook readings.

  6. What is Public Key Cryptography?

  7. PGP (Pretty Good Privacy).

  8. What are the two kinds of PORTS that are used in providing network communications?

  9. Digital signatures and hash functions.

  10. The detection and correction of errors: Hamming codewords, parity methods and CRC.

  11. Ethereal Capture file #1 and Ethereal Capture file #2.

  12. PERL programs and data for testing.

  13. Comparing different length Vignere ciphers: The ghost.txt file with Vignere cipher length = 2, 3, 6, 12 and 24. Notice how the statistical pattern of some letters being the most frequent and some being the least frequent are obscured more as the Vignere cipher goes from two characters up to 24 characters!

    Showing only the 4 or 5 most frequent letters and the 3 or 4 least frequent for 2, 3, 6, 12 and 24.

  14. The Common Body of Knowledge for the security certification exam. You have as a handout the Security Management Practices study guide. It is one of the ten domains of security knowledge.

  15. Last summer's PRESENTATIONS, of the 17 students who did theirs with PowerPoint or a web published approach.

    Ordinal Values (ASCII values of characters) using a PERL program.

  16. Prime numbers and encryption algorithms.

  17. Presentation #1 by Karla: High Fidelity version and another version for 1990s old model T browsers. Notes pages have been added by Mark Jacobson that elaborate on the presentation.
  18. Cryptography (LOW, for older browsers), and Cryptography (HIGH, for state of the art and newest web browsers.

  19. Physical Security (HIGH) for the best presentation possibilities, and ... Physical Security (HIGH), for older browsers.

  20. Firewalls (HIGH) and the low fidelity, older-browser compatible version of the Firewalls (LOW) student presentation.
    Week one:  Chapters one thru five of Cryptography Decrypted (pages 1-44)
               Chapter one and two of Secrets and Lies (pages 1-22)

    Week two:  Chapter nine:  Pioneering Public Key:         (Thursday and Friday)
                              Public Exchange of Secret Keys
                              Graduate student Ralph Merkle's system
                                 developed at Berkeley in the early 70s.

               Chapter thirteen:  Hashes Non-Keyed Message Digests (Friday)
                                  md5sum program used in lab to demonstrate this
                                         message digest and hashing idea

               Secrets and Lies book 
                    Chapter 3: Attacks                 pages 23-41 (Friday readings)
    Week three: 
               Chapter ten:   Confidentiality Using Public Keys (Monday)

               Chapter eleven:  Making Public Keys:  Math Tricks (Monday)

               Secrets and Lies book 
                    Chapter 4: Adversaries             pages 42-58 (Monday readings)
                    Chapter 5: Security Needs          pages 59-82 (Tuesday readings)