CS4153-SS - TU Department of Mathematical and Computer

advertisement
COURSE DESCRIPTION
Department and Course Number
Course Title
CS 4153
Course Coordinator
Computer Security
Total Credits
Sujeet Shenoi
03
Current Catalog Description
Introduction to security problems in computing. Basic encryption and decryption techniques. Secure
encryption systems. Cryptographic protocols and practices. Operating systems security. Program
security. Legal and ethical issues in computer security. Prerequisites: CS 3013 and CS 3053.
Textbook
Security in Computing (Second Edition), by Charles P. Pfleeger, Prentice-Hall, 1997.
References
Various research papers and monographs
Course Goals
To provide students with a good understanding of computer security, including encryption/decryption,
cryptographic protocols, operating system security, program security and legal and ethical issues.
Prerequisites by Topic
1.
Algorithms
2. Theory
3. Operating systems
Major Topics Covered in the Course
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Introduction to security problems
Basic encryption and decryption
Computational complexity and modulo arithmetic
Symmetric and asymmetric encryption systems
Merkle-Hellman knapsacks
RSA encryption
Secure hash algorithms
Digital signature algorithms
DES and Skipjack algorithms
Cryptographic protocols
Enhancing cryptographic security
Operating system security
Security models
Design of trusted operating systems
Assurance in trusted operating systems
Viruses and malicious code
Security controls
Laboratory projects (specify number of weeks on each)
1
1.
2.
Encryption/decryption of monoalphabetic cipers (3 weeks)
Encryption/decryption of polyalphabetic ciphers (3 weeks)
Estimate CSAB Category Content
CORE
ADVANCED
CORE
Computer Organization and
Architecture
Concepts of Programming
Languages
Computer Theory
Data Structures
02
Algorithms
Software Design
ADVANCED
01
Oral and Written Communications
Every student is required to submit at least __0__ written reports (not including exams, tests, quizzes,
or commented programs) of typically __0__ pages and to make __0__ oral presentations of typically
__0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,
as well as for technical content, completeness, and accuracy.
Social and Ethical Issues
These are considered throughout the course; case studies are also presented and discussed.
Theoretical Content
1.
2.
3.
4.
Encryption and decryption algorithms; computability issues
Cryptographic protocols
Security models and policies
Verification
Problem Analysis
1.
2.
3.
Analysis of encryption and decryption algorithms
Analysis of cryptographic protocols
Analysis of security models and policies
Solution Design
1.
2.
How encryption and decryption algorithms are designed
How cryptographic protocols, security models and policies are designed and verified
2
3
Download