Skip to content

Omar Al-Kadi's Homepage

Search
  • Home
  • Experience
  • Research
  • Publications
  • Teaching
  • Contact

Web Application Security (1904710)

Lecture notes*

  • Chapter 1 – Overview
  • Chapter 2 – Classical Encryption Techniques
    • Vigenère & Saint Cyr Slide Cipher example
  • Chapter 3 – Block ciphers and data encryption standards
    • Simplified DES
    • S-Boxes example for simplified DES
    • DES in an example
    • 3DES
  • Chapter 5 – Advanced Encryption Standard
    • AES in an example
  • Chapter 7 – Confidentiality using Symmetric Key Encryption
    • Key distribution Protocols
    • Knapsack & RSA
    • Finding multiplicative inverse using Extended Euclidean theory
  • Chapter 11 – Message Authentication
  • Chapter 12 – Hash algorithms
  • Chapter 13 – Digital Signatures and Authentication Protocols
  • Chapter 14 – Authentication Applications
  • Chapter 15 – Electronic Mail Security
  • Chapter 16 – IP Security
    • Open Source Interconnection (OSN) 7 Layers
    • IPSec VPNs vs SSL VPNs
  • Chapter 17 – Web Security

*Textbook: Cryptography and Network Security: Principles and Practice by William Stallings, Pearson; 6th edition (2013)

Website last updated 20/4/2025