COMP3334 Notes

1 Introduction

1.1 Security

1.2 Threat modeling

 

2 Cryptography

2.1 Crypto tools

2_1_1

2.2 Encryption & Caesar Cipher

2.3 Vernam cipher / One-Time Pad

2.4 Stream ciphers

2.5 Randomness

2.6 Block Ciphers

2.7 Hashing Functions

2.8 Message Authentication Code (MAC)

 

3 Password Security

3.1 Passwords

4 Authentication Protocols

4.1 Public Key Cryptography

4.2 Diffie-Hellman Key Exchange

4.3 TLS

5 Web Security

5.1 HTTP Authentication

5.2 Sessions

5.4 Cross-Site Scripting (XSS) attack

5.5 Cross-Site Request Forgery (CSRF) attack

5.6 Subresource Integrity (SRI)