Computer Science Student Resource Site: Help and advice for the long-suffering, overworked student.
Errata sheet: Latest list of errors, updated at most monthly. File name is Errata-Crypto3e-mmyy. If you spot any errors, please report them to .
Figures: On-line transparency masters of the figures from the book in PDF (Adobe Acrobat) format.
Tables: On-line transparency masters of all the tables from the book in PDF format.
PowerPoint Slides: A set of PDF slides suitable for lecture or handout that covers cryptography topics in some detail. These slides were developed for use with this book by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW
Lecture Slides: A set of slides by Professor Evangelos Kranakis of Carleton University of Ottawa, Canada
Network Security Slides: .A set of slides that focus mostly on Parts Three and Four by Henric Johnson at Blekinge Institute of Technology, Sweden
Laboratory Exercises on Encryption: Two lab exercises on public-key encryption and key sharing, prepared by Prof. James Benham of Montclair State U.
Useful Java Programs: A set of Java applets which implement single block en/decryptions of AES, DES & IDEA. Provided by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW.
NOTICE: No password is required for any downloads. Downloading sometimes fails, either because your browser mistakenly assumes a password is needed or for other reasons. If so, try using another browser or an FTP package. If that doesn't work, there might be a problem at your end or at your ISP, perhaps a firewall issue. Then you would need to talk to a system manager on your end.
A moderated mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author. To subscribe, send a blank email to email@example.com. You will receive a confirmation message. Just reply to this message and your subscription will be complete. To unsubscribe, send a blank email to firstname.lastname@example.org. To post a message, send to email@example.com. Note: You should receive a reply to your subscription request in a few hours, asking for confirmation. If not, try again. The confirmation email asks you to confirm either by replying to the email or by going to a web link. The web link is more reliable. If you reply by email and do not receive a subsequent email confirming your subscription, try again.
Instructors might find these web sites for courses taught using this book useful. I would appreciate hearing about web sites for other courses.
Applied Computer Security Halmstad University, Sweden. Includes projects.
CPSC 557/601.96 Applied Cryptography U.of Calgary. Includes handouts.
Network Security Birla Institute of Technology and Science, India. Online slides.
CS4286 Internet Security and E-commerce Protocols. City University of Hong Kong. PPT slides.
ECE 495F Introduction to Computer Security. Purdue U. Lecture notes and lab exercises.
CS 532 Computer and Network Security. Sabanci U., Turkey. Lecture notes.
Data Security Course. Uppsala U., Sweden. Lots of links
CMPE 553. Eastern Mediterranean U., Cyprus. Lecture notes.
MA479/CSSE490 Cryptography. Rose-Hulman Institute of Technology. Some good supplementary material.
CS458/658 Network Security. Boston U. Some good links and supplementary material.
CISH-6960H08 Cryptography and Network Security. Rensselaer U. Links and other material.
CSCE 815 Network Systems Security. U. of South Carolina. Includes powerpoint slides.
CSI4138 Design of Secure Computer Systems. U. of Ottowa. Includes course handouts.
Cryptography Independent Study.U. of Puget Sound. Good set of links.
CS494 Computer and Network Security. U. of Tennessee. Good set of links and other resources.
CSE 508 Computer Security. SUNY, Stony Brook. Includes lecture notes.
EECS 598 Cryptography and Network Security. U of Michigan. On-line presentation slides..
ECE 543 Cryptology and Computer Network Security. At George Mason U. Includes list of projects and laboratory exercises.
CMSC-443 Cryptography and Data Security. At U of Maryland.