pront_s04

advertisement
ICOM 5018 – Network Security and Cryptography
Spring 2004
Purpose:
This course introduces and provides practical experience in network security issues and cryptographic
techniques. Cryptographic algorithms and protocols are introduced and their use in secure protocols such
as secure shell (SSH) and secure mail (Pretty Good Privacy/PGP) are studied.
Objectives:
After completing this course you should be able to:
 Understand the basic concepts and protocols used in cryptographic applications
 Be able to use these concepts in analyzing real-world applications involving cryptography
 Have some understanding of current attacks on system security.
 Know and have experience with information sources related to security weaknesses.
Laboratory:
The laboratory work will be done in the UNIX laboratory (122 Stefani), normally in the Linux and
MSWindows environments. The lab work will include short exercises using system capabilities and a
longer project. Accounts will be established on the various systems if you do not already have one. The
Networking and Operating systems laboratory is also available for both laboratories and projects requiring
root access and kernel modification. Based on the amount of credit given for the laboratory and the entire
course, the projects will be designed to take about 30 hours (2 hours/week) to complete.
Course Information:
Grading basis:
Partial exams (3 @ 100 points)
Final exam
Programs (2 @ 50 points)
Project
Total
300
150
100
100
650
Note: The programs must be completed in order to pass the course
Professor: Thomas L. Noack, 405 Stefani, extension 3652, noack@urayoan.uprm.edu
Office hours: Tuesday, Thursday 9:00-10:30AM and 12:00 - 1:30- PM
Text:
[1] Stallings, William, Cryptography and Network Security, 3d. Ed., Prentice-Hall, 2002.
References:
[1] Schneier, Bruce, Applied Cryptography, 2nd. Ed.,Wiley, 1996
[2] Simson Garfinkel, PGP: Pretty Good Privacy, O’Reilly, 1994
[3] McClure, Stuart, et. al.,Hacking Exposed, 3d Edition, Osborne/McGraw-Hill, 2001
Comments: Most information, including this outline, will be distributed through my web page
http://amadeus.uprm.edu/˜noack
dates shown
Examinations will be held during the class period on the
ICOM 5995 – Network Security and Cryptography
Spring 2004
Text – William Stallings, Cryptography and Network Security: Principles and Practice, 3/e
Date
15-Jan
20-Jan
22-Jan
27-Jan
29-Jan
3-Feb
5-Feb
10-Feb
12-Feb
17-Feb
19-Feb
24-Feb
26-Feb
2-Mar
4-Mar
9-Mar
11-Mar
16-Mar
18-Mar
25-Mar
30-Mar
1-Apr
13-Apr
15-Apr
20-Apr
27-Apr
29-Apr
4-May
6-May
11-May
Reading
Stallings, Ch.1
Stallings, Ch.2
Stallings, Ch.3
Stallings, Ch.4
Stallings, Ch.5
Stallings, Ch.6
Stallings, Ch.7
Stallings, Ch.8
Stallings, Ch.9
Stallings, Ch.10
Stallings, Ch.11
Stallings, Ch.12
Stallings, Ch.13
Stallings, Ch.14
Stallings, Ch.15
Stallings, Ch.16
Stallings, Ch.17
Stallings, Ch.18
Stallings, Ch.19
Schneier
Schneier, Web
Topic
Overview
Conventional Encryption: Classical Techniques
Conventional Encryption: Modern Techniques
Introduction to Finite Fields
Conventional Encryption: AES
Contemporary Symmetric Ciphers
Confidentiality Using Conventional Encryption
Introduction to Number Theory
(Continued)
Public-Key Cryptography
Exam I
Preliminary project presentations
Key Management
Message Authentication and Hash Functions
Hash and Mac Algorithms
Digital Signatures and Authentication Protocols
Exam II
Authentication Applications
Electronic Mail Security
IP Security
(Continued)
Web Security
Intruders, Viruses, and Worms
(Continued)
Firewalls
Exam III
Cryptanalysis Methods
Legal and Social Issues - Current Legislation
Report Presentations
Download