Computer and Network Security
by
Avinash Kak
Think of these lecture notes as a living textbook that strives to strike a balance between the systems-oriented issues and the cryptographic issues. Without the latter, many aspects of the former cannot be fully comprehended, and, without the former, the latter are too dry to appreciate.
Note for instructors using
these slides/notes: It is not uncommon for
the instructors who use these notes/slides to want to know
how exactly I use them in class since there is much more
information on a typical slide than you will usually find in
a powerpoint presentation.
Here is the answer:
Homework assignments typically involve writing Python (or,
Perl) scripts in order to gain a deeper understanding of the
ideas through actual implementation. (From a pedagogical
standpoint, scripting is much more efficient for this than
writing code in raw C.) In the part of the course
that deals with encryption and hashing, students write
scripts for implementing DES, AES, RC4, SHA1, SHA512,
etc. In the part of the course that deals with more
system related issues, the students are asked to write
scripts that carry out DoS attacks, buffer overflow attacks,
etc., against servers (for buffer overflow attacks, that
would be a socket program in C with intentionally embedded
buffer-overflow vulnerability).
The 2025 update of the lecture notes has been completed. The next
major update of this material is scheduled for the January
– April 2026 time frame.
When will this material be updated next?: