Lecture One: Cryptography Before 1970

advertisement
Computer Science SYCS 654-01: Computer Security II
Howard University
Professor: Wayne Patterson
Syllabus Spring 2010
Computer Security, or information security, or information assurance is a rapidly growing field. The
vastly increased use of the internet and the attendant problems with privacy and security have created
enormous interest in this area.
As we indicated in Computer Security I, this is a topic that is expanding very rapidly in our field and
for which many, many questions remain to be answered. It is hoped that this course will place the
student at the edge of some of the many research questions in Computer and Information Security.
Professor: Wayne Patterson, Senior Fellow in the Graduate School and Professor of Computer
Science. My office is Room 110 in the Graduate School. You can certainly call me there and also meet
by appointment if you wish. My Graduate School number is 202-806-5518. FAX: 413-451-9837.
Email: Either wpatterson@howard.edu. Residence: 202-546-8166.
Grading Scale: 60 – 69: C;
70 – 79: B;
80 – 100: A.
Logistics: Class time will be arranged at the first meeting, Wednesday, January 6, 6:10 pm, Room 2006
Downing Hall
Evaluation: There will be several assignments (value 40%), one test (value 20%), a final exam (value
40%).
Texts: The primary text is Information Security, Mark Stamp, Wiley 2006, chapters 9-12. The secondary
text is Security Engineering, by Ross Anderson, John Wiley and Sons, 2001, chapters 8, 12, 13, 18, 19. I
will be giving lecture notes as handouts, or will make them available on Blackboard. Many of the
assignments will also involve computational problems, and either Maple 10 or Mathematica 5 are
recommended.
Lectures:
1) Hash Functions
6) Software security I
2) Simple Authentication Protocols
a) Software flaws
3) Network Security
b) Malware
a) Network attack and defense
4) Real-world Security protocols
c) Miscellaneous software-based attacks
7) Software security II
a) SSL
a) Software reverse engineering
b) IPSec
b) Software tamper resistance
c) Kerberos
c) Digital rights management
d) GSM
d) Software development
5) Steganography
8) Advanced encryption techniques
9) Electronic voting
10) Coin flipping by telephone
11) Mental Poker
12) Quantum cryptography
Download