"Posterity: you will never know how much it has cost my generation to preserve your freedom. I hope you will make good use of it."
- John Quincy Adams

Introduction to Cryptography and
Network Security

Instructor: Malik Magdon-Ismail
Primary Text: Cryptography and Network Security: Principles and Practice, 2nd Ed.

Course Description

I undertook this course as an independent study while at RPI. The intent was to gain an understanding of the algorithms and protocols underlying various network security technologies. As these technologies are, in large part, dependent on cryptography, much of the course detailed the development of cryptographic systems in general and examined the specifics of numerous algorithms in particular. The course covered both symmetric and public-key technologies, and concluded with a low-level implementation of the RSA public-key system.

During the study I read sections of the text and then prepared presentations which I delivered in meetings with Professor Magdon-Ismail. Below I have included links to the presentations I produced during the study.


Date Presentation Chapters
Sep 10 Intro to Network Security
Basic Cryptography
Block Ciphers / DES
Chp 1,2,3
Sep 24 Other Block Cipher Algorithms Chp 4
Oct 8 Key Distribution
Random / Pseudo-Random Numbers
Chp 5
Oct 22 & Nov 12 Public-Key Cryptography
RSA Algorithm
Diffie-Hellman Key Exchange
Chp 6,7
Nov 26 Message Authentication and Hash Functions
Hash Algorithms
Chp 8,9
Dec 3 Digital Signatures
Authentication Protocols
Chp 10

Other Cryptography Work

Copyright 2005-2014 R. Conlan