This page provides links to a number of articles provided to support the
Yes, a number are more than 10 years old,
but they provide a historical context and are still very relevant.
Additional materials may be added here as the unit progresses or,
if you'd like to suggest that something is added,
please contact Chris McDonald.
Introduction and network summaries:
- A Painless Guide To CRC Error Detection
or "Everything you wanted to know about CRC algorithms,
but were afraid to ask for fear that errors in
your understanding might be detected."
- by Ross N. Williams.
- Ethernet Systems on Personal Computers
(circa 1995, origin unknown).
- Ethernet: Distributed Packet Switching for Local Computer Network,
by Robert M. Metcalfe and David R. Boggs,
Communications of the ACM, Vol. 19, No. 5, July 1976 pp. 395 - 404.
- "Measured Capacity of an Ethernet: Myths and Reality",
by Boggs, Mogul, and Kent,
Proceedings of the SIGCOMM'88 Symposium on Communications
Architectures and Protocols, ACM SIGCOMM,
vol 4, pp222-34, August 1988.
Wireless network monitoring (Lecture week-5):
Language specific socket programming tutorials:
Cryptographic building blocks:
- The Australian Crypto FAQ.
- WikiProject Cryptography (almost encyclopedic).
- 4-digit PIN analysis.
- Snake Oil Warning Signs: Encryption Software to Avoid.
- The Crypto Gardening Guide and Planting Tips,
by Peter Gutmann (may be considered too theoretical for some).
- The Data Encryption Standard (DES) and its strength against attacks,
by D. Coppersmith,
- How RSA works
Why RSA works,
- How does SSL/TLS work?,
from Information Security Stack Exchange.
- Chapter 1 of
Network Security with OpenSSL (general, gentle introduction pp1-12).
- The OpenSSL Command-Line HOWTO,
by Paul Heinlien.
- The OpenSSL Project.
- The stunnel - the universal SSL wrapper.
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,
by H.Abelson, R.Anderson, S.M.Bellovin, J.Benaloh, M.Blaze, W.Diffie,
J.Gilmore, P.G.Neumann, R.L.Rivest, J.I.Schiller, and B.Schneier -
all very famous authors in the security and cryptography arena.