ICOM 5018 – Network Security and Cryptography
Spring 2010
This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols are introduced and their use in secure protocols such as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied.
After completing this course you should be able to:
The laboratory work will be
done in the UNIX laboratory (122 Stefani), normally in the Linux and MSWindows environments. The lab work will include short
exercises using system capabilities and a longer project. Accounts will be
established on the various systems if you do not already have one. The
Networking and Operating systems laboratory is now in use for other courses. For
both laboratories and projects requiring root access and kernel modification
other arrangements must be made, most ICOM students now have their own laptops
and Microsoft subscriptions. Every
effort will be made to assist in this process. Based on the amount of credit
given for the laboratory and the entire course, the projects will be designed
to take about 30 hours (2 hours/week) to complete.
Partial exams (3 @ 100 points) |
300 |
Final exam |
150 |
Programs and/or problem sets (2 @ 50 points) |
100 |
Project |
100 |
Total |
650 |
Note: The programs and/or problem sets must be completed in order to pass the
course
Professor: Thomas L. Noack, 405 Stefani, extension 3652, noack@urayoan.uprm.edu
Tuesday, Thursday 7:30 – 9: 00 am, 12:30 pm – 2:00 pm – in S-405 (Office)
Also I am often
available in the universal hour Tuesday and Thursday 10:30 am – 12:30 pm.
[1] Stallings, William, Cryptography and Network Security, 4th. Ed., Prentice-Hall, 2006.
[1] Schneier, Bruce, Applied Cryptography, 3rd. Ed.,Wiley, 2003
[2] Simson Garfinkel, PGP: Pretty Good Privacy, O’Reilly, 1994
[3] McClure, Stuart, et. al.,Hacking Exposed, 3d Edition, Osborne/McGraw-Hill, 2001
[4]
Comments: Most information, including this outline, will be distributed through my web page
http://ece.uprm.edu/˜noack are responsible for checking this page at least once per week, and when changes are announced in class
Examinations will be held during the class period on the dates shown
Note: The course
will be conducted in accordance with University regulations. These are promulgated by the administration
and, since they are subject to change, will not be duplicated here.
ICOM 5018 – Network Security and Cryptography
Spring 2010
Text – William Stallings, Cryptography and Network
Security: Principles and Practice, 4/e
Date |
|
Topic |
14-Jan |
Stallings,
Ch.1 |
Overview |
19-Jan |
Stallings,
Ch.2 |
Conventional
Encryption: Classical Techniques |
26-Jan |
Stallings,
Ch.3 |
Conventional
Encryption: Modern Techniques |
28-Jan |
Stallings,
Ch.4 |
Introduction
to Finite Fields |
2-Feb |
Stallings,
Ch.5 |
Conventional
Encryption: AES |
4-Feb |
Stallings,
Ch.6 |
Contemporary
Symmetric Ciphers |
9-Feb |
Stallings,
Ch.7 |
Confidentiality
Using Conventional Encryption |
11-Feb |
Stallings,
Ch.8 |
Introduction
to Number Theory |
16-Feb |
|
Exam I |
18-Feb |
(continued) |
|
23-Feb |
Stallings,
Ch.9 |
Public-Key
Cryptography |
25-Feb |
|
Preliminary
project presentations |
2-Mar |
Stallings,
Ch.10 |
Key
Management |
4-Mar |
Stallings,
Ch.11 |
Message
Authentication and Hash Functions |
9-Mar |
Stallings,
Ch.12 |
Hash
and Mac Algorithms |
11-Mar |
|
|
16-Mar |
Exam II |
|
18-Mar |
Stallings,
Ch.13 |
Digital
Signatures and Authentication Protocols |
23-Mar |
Stallings,
Ch.14 |
Authentication
Applications |
25-Mar |
Stallings,
Ch.15 |
Electronic
Mail Security |
6-Apr |
Stallings,
Ch.16 |
IP
Security |
8-Apr |
|
(Continued) |
15-Apr |
Stallings,
Ch.17 |
Web
Security |
20-Apr |
Stallings,
Ch.18 |
Intruders,
Viruses, and |
22-Apr |
|
(Continued) |
27-Apr |
Exam III |
|
29-Apr |
Stallings,
Ch.19 |
Firewalls |
4-May |
Schneier |
Cryptanalysis
Methods |
6-May |
Schneier, Web |
Legal
and Social Issues - Current Legislation |
11-May |
|
Report Presentations |