ICOM 5018 – Network Security and Cryptography

Spring 2010

Purpose:

This course introduces and provides practical experience in network security issues and cryptographic techniques.  Cryptographic algorithms and protocols are introduced and their use in secure protocols such as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied.

Objectives:

After completing this course you should be able to:

  • Understand the basic concepts and protocols used in cryptographic applications
  • Be able to use these concepts in analyzing real-world applications involving cryptography
  • Have some understanding of current attacks on system security.
  • Know and have experience with information sources related to security weaknesses.

Laboratory:

The laboratory work will be done in the UNIX laboratory (122 Stefani), normally in the Linux and MSWindows environments. The lab work will include short exercises using system capabilities and a longer project. Accounts will be established on the various systems if you do not already have one. The Networking and Operating systems laboratory is now in use for other courses. For both laboratories and projects requiring root access and kernel modification other arrangements must be made, most ICOM students now have their own laptops and Microsoft subscriptions.  Every effort will be made to assist in this process. Based on the amount of credit given for the laboratory and the entire course, the projects will be designed to take about 30 hours (2 hours/week) to complete.

Course Information:

Grading basis:

Partial exams (3 @ 100 points)

300

Final exam

150

Programs and/or problem sets (2 @ 50 points)

100

Project

100

Total

650

 

Note: The programs and/or problem sets must be completed in order to pass the course

Professor:   Thomas L. Noack, 405 Stefani, extension 3652, noack@urayoan.uprm.edu

Office hours:  

Tuesday, Thursday 7:30 – 9: 00 am, 12:30 pm – 2:00 pm – in S-405  (Office)

Also I am often available in the universal hour Tuesday and Thursday 10:30 am – 12:30 pm.

Text:

[1] Stallings, William, Cryptography and Network Security, 4th. Ed., Prentice-Hall, 2006.

References:

[1] Schneier, Bruce, Applied Cryptography, 3rd. Ed.,Wiley, 2003

[2] Simson Garfinkel, PGP: Pretty Good Privacy, O’Reilly, 1994

[3] McClure, Stuart, et. al.,Hacking Exposed, 3d Edition, Osborne/McGraw-Hill, 2001

[4]

Comments: Most information, including this outline, will be distributed through my web page

http://ece.uprm.edu/˜noack  are responsible for checking this page at least once per week, and when changes are announced in class

Examinations will be held during the class period on the dates shown

Note: The course will be conducted in accordance with University regulations.  These are promulgated by the administration and, since they are subject to change, will not be duplicated here.


 

ICOM 5018 – Network Security and Cryptography

Spring 2010

Text – William Stallings, Cryptography and Network Security: Principles and Practice, 4/e

Date

Reading

Topic

14-Jan

Stallings, Ch.1

 Overview

19-Jan

Stallings, Ch.2

 Conventional Encryption: Classical Techniques

26-Jan

Stallings, Ch.3

 Conventional Encryption: Modern Techniques

28-Jan

Stallings, Ch.4

Introduction to Finite Fields

2-Feb

Stallings, Ch.5

 Conventional Encryption: AES

4-Feb

Stallings, Ch.6

Contemporary Symmetric Ciphers

9-Feb

Stallings, Ch.7

 Confidentiality Using Conventional Encryption

11-Feb

Stallings, Ch.8

 Introduction to Number Theory

16-Feb

 

Exam I

18-Feb

(continued)

23-Feb

Stallings, Ch.9

 Public-Key Cryptography

25-Feb

 

Preliminary project presentations

2-Mar

Stallings, Ch.10

 Key Management

4-Mar

Stallings, Ch.11

Message Authentication and Hash Functions

9-Mar

Stallings, Ch.12

 Hash and Mac Algorithms

11-Mar

 

 

16-Mar

Exam II

18-Mar

Stallings, Ch.13

 Digital Signatures and Authentication Protocols

23-Mar

Stallings, Ch.14

 Authentication Applications

25-Mar

Stallings, Ch.15

 Electronic Mail Security

6-Apr

Stallings, Ch.16

 IP Security

8-Apr

 

(Continued)

15-Apr

Stallings, Ch.17

 Web Security

20-Apr

Stallings, Ch.18

 Intruders, Viruses, and Worms

22-Apr

 

(Continued)

27-Apr

Exam III

29-Apr

Stallings, Ch.19

 Firewalls

4-May

Schneier

 Cryptanalysis Methods

6-May

Schneier, Web

 Legal and Social Issues - Current Legislation

11-May

 

Report Presentations