ICOM 5018 – Network Security and Cryptography Spring 2004 Purpose: This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols are introduced and their use in secure protocols such as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied. Objectives: After completing this course you should be able to: Understand the basic concepts and protocols used in cryptographic applications Be able to use these concepts in analyzing real-world applications involving cryptography Have some understanding of current attacks on system security. Know and have experience with information sources related to security weaknesses. Laboratory: The laboratory work will be done in the UNIX laboratory (122 Stefani), normally in the Linux and MSWindows environments. The lab work will include short exercises using system capabilities and a longer project. Accounts will be established on the various systems if you do not already have one. The Networking and Operating systems laboratory is also available for both laboratories and projects requiring root access and kernel modification. Based on the amount of credit given for the laboratory and the entire course, the projects will be designed to take about 30 hours (2 hours/week) to complete. Course Information: Grading basis: Partial exams (3 @ 100 points) Final exam Programs (2 @ 50 points) Project Total 300 150 100 100 650 Note: The programs must be completed in order to pass the course Professor: Thomas L. Noack, 405 Stefani, extension 3652, noack@urayoan.uprm.edu Office hours: Tuesday, Thursday 9:00-10:30AM and 12:00 - 1:30- PM Text: [1] Stallings, William, Cryptography and Network Security, 3d. Ed., Prentice-Hall, 2002. References: [1] Schneier, Bruce, Applied Cryptography, 2nd. Ed.,Wiley, 1996 [2] Simson Garfinkel, PGP: Pretty Good Privacy, O’Reilly, 1994 [3] McClure, Stuart, et. al.,Hacking Exposed, 3d Edition, Osborne/McGraw-Hill, 2001 Comments: Most information, including this outline, will be distributed through my web page http://amadeus.uprm.edu/˜noack dates shown Examinations will be held during the class period on the ICOM 5995 – Network Security and Cryptography Spring 2004 Text – William Stallings, Cryptography and Network Security: Principles and Practice, 3/e Date 15-Jan 20-Jan 22-Jan 27-Jan 29-Jan 3-Feb 5-Feb 10-Feb 12-Feb 17-Feb 19-Feb 24-Feb 26-Feb 2-Mar 4-Mar 9-Mar 11-Mar 16-Mar 18-Mar 25-Mar 30-Mar 1-Apr 13-Apr 15-Apr 20-Apr 27-Apr 29-Apr 4-May 6-May 11-May Reading Stallings, Ch.1 Stallings, Ch.2 Stallings, Ch.3 Stallings, Ch.4 Stallings, Ch.5 Stallings, Ch.6 Stallings, Ch.7 Stallings, Ch.8 Stallings, Ch.9 Stallings, Ch.10 Stallings, Ch.11 Stallings, Ch.12 Stallings, Ch.13 Stallings, Ch.14 Stallings, Ch.15 Stallings, Ch.16 Stallings, Ch.17 Stallings, Ch.18 Stallings, Ch.19 Schneier Schneier, Web Topic Overview Conventional Encryption: Classical Techniques Conventional Encryption: Modern Techniques Introduction to Finite Fields Conventional Encryption: AES Contemporary Symmetric Ciphers Confidentiality Using Conventional Encryption Introduction to Number Theory (Continued) Public-Key Cryptography Exam I Preliminary project presentations Key Management Message Authentication and Hash Functions Hash and Mac Algorithms Digital Signatures and Authentication Protocols Exam II Authentication Applications Electronic Mail Security IP Security (Continued) Web Security Intruders, Viruses, and Worms (Continued) Firewalls Exam III Cryptanalysis Methods Legal and Social Issues - Current Legislation Report Presentations