Usted está aquí: Inicio Ingeniería Informática Cryptography and computer security Related resources

Related resources

Acciones de Documento
  • Marcadores (bookmarks)
  • Exportación de LTI
Autores: Ana I. González-Tablas Ferreres, José M. de Fuentes García-Romero de Tejada, Lorena González Manzano, Sergio Pastrana Portillo
En esta sección encontraremos materiales complementarios de estudio, simuladores u otras herramientas libres y descargables, conferencias, visitas a empresas, ...

Introduction to Cryptography by Christof Paar

  • RR-E-001. Lecture 1: Introduction to Cryptography by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-002. Lecture 2: Modular Arithmetic and Historical Ciphers by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-003 . Lecture 3: Stream Ciphers, Random Numbers and the One Time Pad by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-004 . Lecture 4: Stream Ciphers and Linear Feedback Shift Registers by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-005 . Lecture 5: Data Encryption Standard (DES): Encryption by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-006 . Lecture 6: Data Encryption Standard (DES): Key Schedule and Decryption by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-007 . Lecture 7: Introduction to Galois Fields for the AES by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-008 . Lecture 8: Advanced Encryption Standard (AES) by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-009 . Lecture 9: Modes of Operation for Block Ciphers by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-010 . Lecture 10: Multiple Encryption and Brute-Force Attacks by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-011 . Lecture 11: Number Theory for PKC: Euclidean Algorithm, Euler's Phi Function & Euler's Theorem ( YOUTUBE VIDEO ).
  • RR-E-012 . Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-013 . Lecture 13: Diffie-Hellman Key Exchange and the Discrete Log Problem by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-014 . Lecture 14: The Generalized Discrete Log Problem and the Security of Diffie-Hellman by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-015 . Lecture 15: Elgamal Encryption Scheme by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-016 . Lecture 16: Introduction to Elliptic Curves by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-017 . Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-018 . Lecture 18: Digital Signatures and Security Services by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-019 . Lecture 19: Elgamal Digital Signature by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-020 . Lecture 20: Hash Functions by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-021 . Lecture 21 (update): SHA-3 Hash Function by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-022 . Lecture 22: MAC (Message Authentication Codes) and HMAC by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-023 . Lecture 23: Symmetric Key Establishment and Kerberos by Christof Paar ( YOUTUBE VIDEO ).
  • RR-E-024 . Lecture 24: Man-in-the-middle Attack, Certificates and PKI by Christof Paar ( YOUTUBE VIDEO ).

Basic & Advanced Cryptography and Public Key Infrastructure by Sunny Classroom

  • RR-E-025 . Private Key Encryption (Symmetric Key Encryption) ( YOUTUBE VIDEO ).
  • RR-E-026 . Public Key Encryption (Asymmetric Key Encryption) ( YOUTUBE VIDEO ).
  • RR-E-027 . How hash function work? ( YOUTUBE VIDEO ).
  • RR-E-028 . Tricks to hack hashed passwords ( YOUTUBE VIDEO ).
  • RR-E-029 . Dictionary Attack and Brute Force Attack: hacking passwords ( YOUTUBE VIDEO ).
  • RR-E-030 . Kerberos - authentication protocol ( YOUTUBE VIDEO ).
  • RR-E-031 . How to salt and pepper passwords? ( YOUTUBE VIDEO ).
  • RR-E-032 . What is digital signature? ( YOUTUBE VIDEO ).
  • RR-E-033 . Why digital certificate? ( YOUTUBE VIDEO ).
  • RR-E-034 . How SSL certificate works? ( YOUTUBE VIDEO ).
  • RR-E-035 . PKI - trust & chain of trust -why, who and how? ( YOUTUBE VIDEO ).
  • RR-E-036 . SSL/TLS handshake Protocol ( YOUTUBE VIDEO ).
  • RR-E-037 . PKI: self-signed digital certificate? ( YOUTUBE VIDEO ).
  • RR-E-038 . Revocation of digital certificates: CRL, OCSP, OCSP stapling ( YOUTUBE VIDEO ).

Unlocking Information Security @edX by Tel Aviv University

  • RR-E-039 . Unlocking Information Security I ( edX COURSE ).
    The course description states the students will learn the following concepts:
    • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
    • An overview of cryptography with an emphasis on symmetric ciphers.
    • A high-level examination of hash functions and an overview of common hash algorithms.
    • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
    • An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP
  • RR-E-040 . Unlocking Information Security II ( edX COURSE ).
    The course description states the students will learn the following concepts:
    • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls
    • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC
    • A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?
    • An introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them

Cryptography Course Materials (2020/2021) by University of Cambridge

  • RR-E-041 . Slide show ( PDF ).
  • RR-E-042 . Lecture recordings ( WEB PAGE ).
  • RR-E-043 . Slides handout (4 slides per page) ( PDF ).

Cryptographic Key Length Recommendation

  • RR-E-044 . Cryptographic Key Length Recommendation by BlueKrypt ( WEB PAGE ).

Information security short videos by Aleksander Essex from Western University

  • RR-E-045 . Information Security Goals and Principles ( YOUTUBE VIDEO ).
  • RR-E-046 . Encryption Basics and Classical Ciphers ( YOUTUBE VIDEO ).
  • RR-E-047 . Semantic Security and the One-Time Pad ( YOUTUBE VIDEO ).
  • RR-E-048 . Encrypting with Block Ciphers ( YOUTUBE VIDEO ).
  • RR-E-049 . Fingerprinting with Hash Functions ( YOUTUBE VIDEO ).
  • RR-E-050 . Authenticating Data with Message Authentication Codes ( YOUTUBE VIDEO ).

AES Animation by Enrique Zabala

  • RR-E-051 . AES Rijndael Cipher explained as a Flash animation ( YOUTUBE VIDEO ).

Additional references

  • RR-B-001. Ross Anderson (2020). Security Engineering. A guide to building dependable distributed systems. Third edition. Wiley.
    Second and first edition are freely available at the WEB PAGE OF THE BOOK
  • RR-B-002. A. G. Konheim (2007). Computer security and cryptography. John Wiley & Sons.
  • RR-B-003. Paul C. van Oorschot (2020). Computer Security and the Internet Tools and Jewels. Springer.
Reutilizar Curso
Descargar este curso