2019
2019
Course Description
Text Book
Computer Networks A Top-Down Approach. James F. Kurose and Keith W. Ross , 6th Edition.
Syllabus
1 | 2/10 | Course organization | |
2 | 16/10 | Definitions Security Services Security Mechanism Terminology and Background Basic Cryptographic Algorithms Classical model of encryption Modular Arithmetic | |
3 | 23/10 30/10 | Greatest Common Divisor(GCD). Least Common Multiple (LCM). Multiplicative Inverse The forms of Encryption | |
4 | 6/11 and 9/11 | Keyless Transposition Ciphers: Keyless Transposition Ciphers: Columnar Transposition Ciphers. Substitution cipher Monoalphabetic Ciphers. | |
7 | 23/11 | Additive Cipher Caesar Cipher Multiplicative Ciphers | |
5 | 2/11 and 9/11 | Affine Ciphers Polyalphabetic Ciphers Autokey Cipher Playfair Key Matrix | |
6 | 7/12 and 14/12 | Hill Cipher One-Time Pad | |
8 | -/- and -/- | Stream cipher Block ciphers Ciphers vs. Block ciphers | |
9 | 7/3 and 13/3 | Encryption and Decryption with Stream Ciphers Shift Register-Based Stream Ciphers Linear Feedback Shift Registers (LFSR) | |
10 | 21/3 | The Data Encryption Standard (DES) and Alternatives Introduction to DES | Data Encryption Standard (DES) 1 file(s) 2.22 MB Simplified DES 1 file(s) 160.10 KB DES Teacher 1 file(s) 83.62 KB |
11 | 28/3 | AES | Rijndael Inspector (AES) 1 file(s) 781.70 KB |
12 | 21/3 | ||
13 | 4/4 | ||
14 | 11/4 and 18/4 | ||
15 | سعيات مادة الامنية 1 file(s) 549.63 KB | ||
16 |