Webster The School of Business & Technology Math & Computer Science Department

Webster
The School of Business & Technology
Math & Computer Science Department
UNIVERSITY
Course
COSC 5130.11
Term
Spring 2
Instructor
Name: John Aleshunas
Phone: 314.246.7565
Email: jalesh@webster.edu
Web site: http://mercury.webster.edu/aleshunas
Catalog
Description
Prerequisites
Course Level
Learning
Outcomes
Computer Security & Reliability
Site: Webster Groves
Students will study hardware and software reliability and security
using currently available technology. Emphasis will be placed on
security analysis of the system, physical threats to systems, virus
protection, system recovery, and encryption.
COSC 5110.
At the completion of this course, each student will be able to:
1. Describe conventional symmetric encryption schemes.
2. Explain the design issues for the selection and use of
encryption protocols for providing confidentiality.
3. Summarize the principles for analyzing public-key
cryptography.
4. Illustrate approaches to the use of authentication and digital
signature techniques.
5. Explain how to anticipate threats to the computer system
and develop procedures for computer recovery.
6. Describe the principles for analyzing system reliability.
7. Summarize the techniques and methods used for
cryptanalysis.
Materials
Cryptography and Network Security: Principals and Practice, (5th
Edition) Stallings, William, Prentice-Hall, Inc., ISBN:
9780136097044
Grading
Page 1 of 7
The GRADUATE catalog provides these guidelines and grading options:
 A/A– Superior graduate work
 B+/B/B– Satisfactory graduate work
 C Work that is barely adequate as graduate-level performance
 CR Work that is performed as satisfactory graduate work (B– or better). A
Last Updated: March 2006.2 TD






grade of "CR”is reserved for courses designated by a department, involving
internships, a thesis, practicums, or specified courses.
F Work that is unsatisfactory
I Incomplete work
ZF An incomplete which was not completed within one year of the end of the
course. ZF is treated the same as an F or NC for all cases involving G.P.A.,
academic warning, probation, and dismissal.
IP In progress
NR Not reported
W Withdrawn from the course
Your grade will be compiled from each of the class evaluation
components in the following proportions:
Mid-term Exam
Final Exam
Homework
Research Project
Total
Activities
25%
25%
10%
40%
100%
In this course, you will actively participate in the study of network
and system security design principles. As graduate students, your
emphasis should be on discovery and implementation and not on
simple memorization of facts. You will be expected to read the
assigned chapters and to actively participate in the class
discussions. Those discussions, as well as the individual projects,
will provide you a practical means to clearly comprehend network
and system security.
The homework assignments will be worth very few grade points
(this implies low risk). Their main purpose is to help me assess your
understanding of the course material and the presentation pace.
They also provide you the side benefit of pointing out what the key
concepts of the material are.
We will have two exams; a mid-term in week 4 and a final in week
9. The mid-term exam will cover all of the material from the first
three weeks. Because this course develops the subject material from
what’s presented earlier in the course, the final exam will be a
comprehensive test of all the material from weeks 1 through 7.
Individual Research Projects
The individual research project provides you the opportunity to
experiment with a selected security topic. You may select any
research topic, subject to my approval. Remember, we are trying to
gain competency in encryption and systems security and some
areas, for example where the problem domain is not constrained
Page 2 of 7
Last Updated: March 2006.2 TD
and well understood, may not be as productive as others.
Additionally, I want to expose you to a variety of security topics.
You can choose to conduct research and publish your findings in a
research paper (approximately ten double-spaced pages) or develop
a working experiment with a security technique or algorithm and
publish your findings in a report (approximately five double-spaced
pages). You will conclude your project with a presentation in week
8. Use the APA (American Psychological Association) style to
format your paper and its reference citations.
This is a formal paper, and it requires a formal presentation. This is
an opportunity for you to share your work with the class. Plan to
take ten-minutes to present your work, before questions and
comments. Don’t read your paper. Determine the most important
and interesting parts of your paper for the presentation (three items
at most). It is not necessary to include everything in the paper in
your presentation, and in fact, there will not be time to do so. You
must use PowerPoint as a presentation aid in you presentation. If
you choose to do a research project, present a demonstration of
your work.
Policy Statements:
University Policies
University policies are provided in the current course catalog and course
schedules. They are also available on the university website. This class is
governed by the university’s published policies. The following policies
are of particular interest:
Academic Honesty
The university is committed to high standards of academic honesty.
Students will be held responsible for violations of these standards.
Please refer to the university’s academic honesty policies for a
definition of academic dishonesty and potential disciplinary actions
associated with it.
Drops and Withdrawals
Please be aware that, should you choose to drop or withdraw from this
course, the date on which you notify the university of your decision
will determine the amount of tuition refund you receive. Please refer
to the university policies on drops and withdrawals (published
elsewhere) to find out what the deadlines are for dropping a course
with a full refund and for withdrawing from a course with a partial
refund.
Special Services
If you have registered as a student with a documented disability
Page 3 of 7
Last Updated: March 2006.2 TD
and are entitled to classroom or testing accommodations, please
inform the instructor at the beginning of the course of the
accommodations you will require in this class so that these can be
provided.
Disturbances
Since every student is entitled to full participation in class without
interruption, disruption of class by inconsiderate behavior is not
acceptable. Students are expected to treat the instructor and other
students with dignity and respect, especially in cases where a
diversity of opinion arises. Students who engage in disruptive
behavior are subject to disciplinary action, including removal from
the course.
Student Assignments Retained
From time to time, student assignments or projects will be retained
by The Department for the purpose of academic assessment. In
every case, should the assignment or project be shared outside the
academic Department, the student's name and all identifying
information about that student will be redacted from the assignment
or project.
Contact Hours for this Course
It is essential that all classes meet for the full instructional time as
scheduled. A class cannot be shortened in length. If a class
session is cancelled for any reason, it must be rescheduled.
Course Policies
Attendance and participation are required. Students with 2 absences
are advised to withdraw from the course. Please notify the
instructor as soon as possible regarding absences.
It is the student’s responsibility to obtain materials for class time
missed. It is a good idea to obtain notes from other students for
class time missed.
The last day to drop the course with a full refund is Friday of Week
2. The last day to withdraw from the course, without a refund, is
Friday of Week 6.
All work is due at the beginning of class and becomes the property
of the department. Any work turned after that will be considered
late and the grade will be reduced by 10 percent per day late.
Any student caught cheating or committing plagiarism might fail
Page 4 of 7
Last Updated: March 2006.2 TD
the class and be subject to further disciplinary action.
This syllabus may be revised at the discretion of the instructor
without the prior notification or consent of the student.
Weekly Schedule
Week 1:
Course overview
Introduction to computer security and attacks
Conventional encryption
Classical techniques:
Steganography
Monoalphabetic Ciphers
Polyalphabetic Ciphers
Transposition Techniques
Rotor Machines
Modern techniques:
Simplified DES
Block Cipher Principles
Differential and Linear Cryptanalysis
The Data Encryption Standard
The Strength of DES
Discussion of individual research papers
Week 2:
The Mathematics of Finite Fields
Modular and Polynomial Arithmetic
The Advanced Encryption Standard (AES)
Triple DES
International Data Encryption Algorithm
Example Algorithms
Characteristics of Advanced Symmetric Block
Ciphers
Traffic Confidentiality
Key Distribution
Random Number Generation
Week 3:
Prime and Relatively Prime Numbers
Testing for Primality
Discrete Logarithms
Principles of Public-Key Cryptosystems
The RSA Algorithm
Page 5 of 7
Last Updated: March 2006.2 TD
Diffie-Hellman Key Exchange
Week 4:
Exam
Week 5:
Authentication Requirements
Authentication Functions
Hash Functions
MD5 Message Digest Algorithm
Secure Hash Algorithm (SHA-1)
Digital Signatures
Authentication Protocols
Digital Signature Standard
Week 6:
Kerberos
X.509 Authentication Service
Pretty Good Privacy
S/MIME
IP Security Architecture
Authentication Header
Combining Security Associations
Week 7:
Web Security Considerations
Secure Sockets Layer and Transport Layer Security
Secure Electronic Transactions
Intruders and Intrusion Detection
Viruses, and Related Threats
Firewall Design Principles
Trusted Systems
Week 8:
Presentation of individual papers
Week 9:
Exam
Additional
Information
Copyright © 2005 – 2006, School of Business & Technology, Webster University. All rights reserved.
Page 6 of 7
Last Updated: March 2006.2 TD
Page 7 of 7
Last Updated: March 2006.2 TD