COURSE DESCRIPTION Department and Course Number Course Title CS 4153 Course Coordinator Computer Security Total Credits Sujeet Shenoi 03 Current Catalog Description Introduction to security problems in computing. Basic encryption and decryption techniques. Secure encryption systems. Cryptographic protocols and practices. Operating systems security. Program security. Legal and ethical issues in computer security. Prerequisites: CS 3013 and CS 3053. Textbook Security in Computing (Second Edition), by Charles P. Pfleeger, Prentice-Hall, 1997. References Various research papers and monographs Course Goals To provide students with a good understanding of computer security, including encryption/decryption, cryptographic protocols, operating system security, program security and legal and ethical issues. Prerequisites by Topic 1. Algorithms 2. Theory 3. Operating systems Major Topics Covered in the Course 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Introduction to security problems Basic encryption and decryption Computational complexity and modulo arithmetic Symmetric and asymmetric encryption systems Merkle-Hellman knapsacks RSA encryption Secure hash algorithms Digital signature algorithms DES and Skipjack algorithms Cryptographic protocols Enhancing cryptographic security Operating system security Security models Design of trusted operating systems Assurance in trusted operating systems Viruses and malicious code Security controls Laboratory projects (specify number of weeks on each) 1 1. 2. Encryption/decryption of monoalphabetic cipers (3 weeks) Encryption/decryption of polyalphabetic ciphers (3 weeks) Estimate CSAB Category Content CORE ADVANCED CORE Computer Organization and Architecture Concepts of Programming Languages Computer Theory Data Structures 02 Algorithms Software Design ADVANCED 01 Oral and Written Communications Every student is required to submit at least __0__ written reports (not including exams, tests, quizzes, or commented programs) of typically __0__ pages and to make __0__ oral presentations of typically __0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as for technical content, completeness, and accuracy. Social and Ethical Issues These are considered throughout the course; case studies are also presented and discussed. Theoretical Content 1. 2. 3. 4. Encryption and decryption algorithms; computability issues Cryptographic protocols Security models and policies Verification Problem Analysis 1. 2. 3. Analysis of encryption and decryption algorithms Analysis of cryptographic protocols Analysis of security models and policies Solution Design 1. 2. How encryption and decryption algorithms are designed How cryptographic protocols, security models and policies are designed and verified 2 3