TE/CS536 Cryptography and Network Security(3 credit hours)

brickborderΑσφάλεια

3 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

67 εμφανίσεις

Course Outline

TE/CS536
Cryptography and Network Security

(3 credit hours)

Spring 200
6


Schedule

Lecture on Tue & Thu (
1230


1345)

Website

http://sst.imt.edu.pk

Instructor

Haroon Atique Babri

Contact

babri@umt.edu.pk

Ext. 323

Office

Ground

Floor, SST
, UMT

52
-
L Gulberg III

Office
Hours

Appointment

Teaching
Assistant

--

Contact

--

Office

--

Office
Hours

--


Course
Description

This course provides an insight into network security.
Starting with a discussion of
possible threats to secure communication
on a public network, we study various
mechanisms
that are employed to counter these threats. These include
cryptographic

algorithms,
and

protocols for
authentication and signature analysis
, public key
systems, confidenti
ality, inte
grity and non
-
repudi
ation
.

Internet
and Web
security
concepts and
protocols including
SSL,
SHTTP, TSP, SET,
Electronic Money,
Email
S
ecurity, WAP security will be discussed in detail.

Network security topics including
fire wall
s
, IP security,
and Virtual Private Networks (
VPN
s) wi
ll also receive
attention
.
Students are expected to do a

gro
up project
.


Expected
Outcomes

Upon completion of this course, students will:



Gain insight into the field of
cryptography, and
network
and web
security.



Understand design principles
for the

plan
ning
of

secure networks.



Understand security weaknesses and implementation of security measures in E
-
mail, IP addressing, web and networks in general.



Understand Public Key systems and protocols and their implementations in
various networks.

Textbook




Cry
ptography and Network Security by
William Stallings
, McGraw
-
Hill, 2003


Grading
Policy



Assignments

and Quizzes
:
2
0%



Project: 20%



Midterms: 25%



Final: 35%


Lecture Plan



Lec


Topic


Reading



1
-
2


Overview of the Network


Chap1



S
ecurity threats and se
curity mechanisms


3
-
4


Intro to cryptography


Chap2



Classical symmetric encryption techniques


5
-
8


Block ciphers, DES

and Triple DES

Chaps 3, 5, 6



Overview of recent encryption algorithms


9
-
11


Application of symmetric encryption

Chap 7



Confidenti
ality


12
-
15

Finding prime factors (number theory)

Chaps 8, 9



Public key (a
symmetric
)

cryptography




RSA


16


MIDTERM


17
-
18


Key
Distribution and
Management

Chap 10


19
-
21


Message authentication, hash functions

Chaps 11, 12


22
-
23


Digital signatures and au
thentication protocols

Chap 13



24


Kerberos


Chap 14


25


Electronic mail security


Chap

15


26


IP Security


Chap 16


27


Web security


Chap 17



SSL, TLS


28


Intrusion detection


Chap 18


29


Malicious software


Chap 19



Viruses and worms


30


Firewa
lls


Chap 20