25874: Fundamentals of Cryptography and Network Security
Course Name: Fundamentals of Cryptography and Network Security
Course Number: 25874
Prerequisite(s): 25751 (Communication Systems)
Co-requisite(s): -
Units: 3
Level: Undergraduate
Last Revision: Fall 2020
Description:
1. To understand what "secure" is and how to evaluate and measure security
2. To understand how various cryptographic schemes work and how they are used in practice.
3. To specify how cryptographic tools are applied to achieve privacy, authentication, and other security services
4. To analyze, understand, and evaluate the security of networked systems
5. To design the security architecture of a network
6. To participate in the design and implementation of security mechanisms
7. To join network security and incident response teams of organizations
Syllabus:
References:
Course Number: 25874
Prerequisite(s): 25751 (Communication Systems)
Co-requisite(s): -
Units: 3
Level: Undergraduate
Last Revision: Fall 2020
Description:
The goal of the course is to give students a fundamental understanding of security and cryptographic concepts. The students will become familiar with the possible risks, threats, and attacks in networks and learn how to protect data and resources in networks. The course also provides the students with the necessary foundations to continue graduate-level studies in secure communications. During this course, some of the security mechanisms and protocols, proposed for different layers of networks, are introduced
Upon successful completion of the course, students will be able1. To understand what "secure" is and how to evaluate and measure security
2. To understand how various cryptographic schemes work and how they are used in practice.
3. To specify how cryptographic tools are applied to achieve privacy, authentication, and other security services
4. To analyze, understand, and evaluate the security of networked systems
5. To design the security architecture of a network
6. To participate in the design and implementation of security mechanisms
7. To join network security and incident response teams of organizations
Syllabus:
- Introduction, Basic Concepts of security goals, adversaries & attacks, and preliminaries
- Stream Ciphers (short)
- Block Ciphers
- DES and AES Ciphers
- Public Key Cryptography
- RSA Algorithm, Diffie-Hellman Key Agreement, …
- Hash Functions, Message Authentication Codes, Digital Signature
- Zero-knowledge algorithms and Secret sharing schemes in HWs
- Public Key Infrastructure (PKI)
- User Authentication Protocols
- Kerberos Protocol
- Access Control Models
- Network and Internet Security
- Transport level security: SSL, TLS, HTTPS, SSH
- Email Security (PGP and S/MIME)
- Security of Transient Data (IP Security and IPSec)
- Intrusion Detection Systems
- Access Control in Networks (Firewalls)
- Physical layer attacks: Jamming and jamming-perpetrated attacks
- Wireless security
- 802.11, Wired Equivalent Privacy (WEP), Wireless Application Protocol (WAP)
- Wireless transport layer security
- Authentication: Kerberos, TLS, PEAP
- Privacy and privacy-enhancing technologies
- Requirements, Privacy by design, PGP, Mix-Nets, Onion routing, Location
- Security for emerging networks and the Internet of Things (IoT)
- Pervasive computing and wireless sensor networks
- Secure and private computation methods
- Block-chain based trust model
- Physical-layer key agreement for IoT
References:
- William Stallings, Cryptography and Network Security Principles and Practices, 7th Edition, Pearson, 2016
- Matt Bishop, Computer Security: Art and Science, Addison-Wesley, 2003
- D. Robling Denning Cryptography and Data Security, Addison-Wesley, 1982
- H. Beker and F. Piper, Cipher System, Northwood Books, 1982
Last Update: 2024-05-06