enter Cryptography, Security and Encryption bibliography

Netiva Caftori


I hope we'll learn from each other

I hear and I forget. I see and I remember. I do and I understand Chinese Proverb

In this course we are going to learn much, all of us. Let's challenge each other.

Textbook: Information Security Intelligence: Cryptographic Principles & Applications , by Thomas Calabrese.

Also: The Code Book by Simon Singh

Welcome to my site!

It is not very secure.

To teach is to learn. Japanese Proverb

"Security is mostly a superstition. It does not exist in nature, nor do the children of men as a whole experience it. Avoidance of danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing." - Helen Keller - Helen Keller

From Wikipedia, the free encyclopedia Cryptography (or cryptology; derived from Greek krypt˘s "hidden," and the verb gr fo "write"). In modern times, it has become a branch of information theory, as the mathematical study of information and especially its transmission from place to place. The noted cryptographer Ron Rivest has observed that " cryptography is about communication in the presence of adversaries." It is a central contributor to several fields: information security and related issues, particularly, authentication, and access control. One of cryptography's primary purposes is hiding the meaning of messages, not usually the existence of such messages. In modern times, cryptography also contributes to computer science. Cryptography is central to the techniques used in computer and network security for such things as access control and information confidentiality. Cryptography is also used in many applications encountered in everyday life; the security of ATM cards, computer passwords, and electronic commerce all depend on cryptography.

Course contents:

  • xfmdpnf up dszquphsbqiz (hi Julius!:)
  • communication security using encryption,
  • Terminology
  • History of cryptography and cryptanalysis
  • Modern cryptography
  • Symmetric-key cryptography
  • Public-key cryptography
  • Cryptanalysis
  • Cryptographic primitives
  • Cryptographic protocols
  • Legal issues involving cryptography
  • Prohibitions
  • Export Controls
  • NSA involvement
  • Digital Rights Management
  • and more

  • ~~~ See tentative schedule. ~~~ lock

    Instructor's office hours ~~~ Assignments

    Sorry for this joke

    Some sources

    For your assignments you may need to learn:

    Theories of great minds

    Description of the text:
    Safeguarding the confidentiality, authenticity, 
    integrity, and non-repudiation of information is paramount to 
    organizational stability and success. This new book provides an 
    understanding of information security, potential threats to our information, 
    and effective countermeasures to proactively combat those threats. 
    A comprehensive review of cryptographic techniques 
    is presented and explained in simple mathematical terms. 
    The text covers symmetrical and asymmetrical encryption, digital signatures, 
    Kerberos, creation/deployment of strong keys and passwords, 
    Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. 
    A detailed examination of Tiny Encryption Algorithm 
    (TEA) exposes readers to the inner workings of encryption. 
    CD-ROM experiments help solidify the learning experience. 
    Emphasis throughout is on the application of 
    the cryptographic methods and support structures needed to effectively apply 
    the principles to create a secure business setting.
    detailed laboratory exercises support and extend the 
    learning experience, familiarizing readers with hacker tactics and effective 
    countermeasures that can ensure the preservation of information 
    coverage focuses on information security, rather 
    than a broad brush information systems security approach. Included is 
    an information centric model for security. Included are video lessons with 
    the author on difficult information security topics. 
    reliable methods of information 
    vulnerability and risk assessment techniques are examined, as well as security 
    policy and plan development and information security management best practices 
    a detailed set of pointers to online resources are given 
    for continued exploration of the information security field 
    companion website is available at 
    www.informationsecurityintel.com, featuring FAQs, Bonus Materials, and more 

    Return to Dr. Caftori's

    Thanks for visiting here!

    ~~~Your comments are appreciated.

    Last updated 4/19/07