CPE 542 Cryptography & Network Security [PDF]

CPE 542 Cryptography &Network Security. Summer Term 2008 - 3 Credits ... In order to view or print the PDF files, yo

4 downloads 39 Views 53KB Size

Recommend Stories


[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Download PDF Cryptography And Network Security
Where there is ruin, there is hope for a treasure. Rumi

Read PdF Cryptography and Network Security
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Read PDF Cryptography and Network Security
Don't count the days, make the days count. Muhammad Ali

Security Issues on Cryptography and Network Security
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Essentials of Cryptography in Network Security
Nothing in nature is unbeautiful. Alfred, Lord Tennyson

Cryptography And Network Security By Atul Kahate Ebook Pdf
Don't ruin a good today by thinking about a bad yesterday. Let it go. Anonymous

PdF Download Cryptography and Network Security: Principles and Practice
The wound is the place where the Light enters you. Rumi

Idea Transcript


CPE 542 Cryptography &Network Security Summer Term 2008 - 3 Credits Jordan University of Science and Technology http://www.just.edu.jo/~tawalbeh/cpe542.html

Announcements Schedule and Classroom: Sun-Tue-Thru 1:15-2:15 PM. Class Room: A2124. In order to view or print the PDF files, you need Adobe Acrobat Reader. Make sure that you install the most recent version of Acrobat Reader in your computer, otherwise, you may not be able to view or print the documents found on this site. Project Details are posted on the web Why should you care about this class? Read this article. (Published in IEEE Computer.) My office hours: Mon, Wed 9:45-11:15 AM, Tue: 2:15-3:15 PM, or by appointment. My office: E1 Level 3 Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Mon, Tue 1:30-2:30 PM Alice and Bob: Security's inseparable couple. Please read chapter 1 from the text book. Overview and Chapter 2 slides are now posted. HW1 is now posted on the web. HW2 is now posted on the web. First Exam details are posted now. HW3 is now posted on the web. Check this AES Flash. Sample Exam- Summer 2005 first exam Please if you have any questions, about HW3, come to ask me in my office. Please have a look to the summer 2005 projects to get idea of what you are supposed to do. The make up for the first exam for the excused students will be in Thursday 24-11-05 from 3:15-4:15, ROOM: E2011. HW5 is now posted Sample Second Exam- Summer 2005 second exam The project report/presentation are extended to Friday 16/12 at 6:00 pm. Please send it to [email protected] Important: Please fill the EVALUATION and put it in the envelope attached to the door of my office. Thanks Check the certificate provided in the lab section. Presentations: If your name is shown below, please be prepared to present your work in 10-15 minutes.: Mohammad Hajjat & Mohammad Abu Zetoon: Implementation of DES, AES, RSA Alaa Alzayadeen, MOhammad Abu Atmeh : Security Enhanced Linux For Thursday Ola Amayri & Boran Altal: Secure Email. Samir Ghishan & Ali Alomari: Secure Wireles Payment Protocol Naser Saleh & Sabri Bagi: Security Holes in Microsoft Outlook Ghassan Rayyashi & Mahmoud Alabed: Kerberos Authentication Protocol Ahmad Shatnawi & Hazim Elne'washi : Image Steganopgraphy---Back up Required sections form the final material :9.1, 9.2, 10.1, 10.2,10.3, 11.1, 11.2, 11.3, 11.4, 12.2,12.4, 13.1, 13.3 The presentations required in the final exam are: Firewalls, Network Security, Bluetooth, Viruses/Worms.

Grades Grades

Project Project Requirements The title and abstract are due the 4th week Every body is required to submit a report and prepare a 10-15 minutes presentation for the project. The report and presentation due date will be in the last week of classes. Please send it to [email protected] Summer 2005 Projects

The Lab Schedule and Lab Room: Sun, Wed: 2:15-5:15 PM., in LAB1 Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Tue, Thru : 10:00-11:00 AM Lab 1 Slides Certificate

Exams First Exam: 11/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: Chapter2, except section 2.4. Chapter3, except Linear Attack. Second Exam: 27/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: 5.1, 5.2, 6.1, 6.2, 7.1, 7.2, 7.3, 7.4

Homework Assignments HW1 - : Search the web and find 6 major computer and/or network security companies and identify a product from each company. Provide the following: 1. URL of the company website, 2. URL of the product website, 3. A brief description of the product (one paragraph in your own words). Selected Solutions by Ghassan Rayyashi HW2 - : Please solve the following problems from Chapter 2: Review Problems: 2.3, 2.7, 2.11 Problems: 2.4, 2.6, 2.10 Selected Solutions by Mohammad Hajjat HW3 - : Please solve the following problems from Chapter 3: Review Problems: 3.3, 3.7, 3.8 Problems: 3.7, 3.9, 3.12, 3.16 Selected Solutions by Ahmad Shatnawi HW4- please solve the following problems from chapter 5 in the text book-page 168: -- Submit using Moodle; Review problems: 5.3, 5.9, 5.13. Problems: 5.3, 5.6 - Selected Solutions by Hanadi Obeidat HW5- : please solve the following problems from chapter 6 in the text book: -- Submit using Moodle; Review Problems: 6.1, 6.2, 6.4, 6.6 page 197 . Problems: 6.1, 6.2, 6.4 page 199 Selected Solutions by Simsam Hijjawi All homework assignments are submitted by email to : [email protected]. Please name your file as your last name followed by homework number, for example, tawalbeh-hw1.pdf. Also make sure that your name is printed within the homework file. Late HWs are not accepted

Course Plan Week 1: Introduction and Basic Concepts: Introduction ; Some Basic Number Theory Weeks 2, 3: Chapter 2: Classical Encryption Techniques Chapter 2 Weeks 4, 5: Chapter 3: Block Cipher and DES Chapter 3 Weeks 6,7: Chapter 5: Advanced Encryption Standard (AES) Chapter 5 Federal Publication (AES) FIPS-197 Week 8: Chapter 6: Contemporary Symmetric Chiphers Chapter 6 Week 9: Chapter 7: Confidentiality Using Symmetric Encryption Chapter 7 Week 10:Chapter 9: Public Key Cryptography and RSA: Chapter 9 Week 11: Chapter 10: Key Management; Other Public Key Cryptosystems Chapter 10 Week 12: Chapter11: Message Authentication and Hash Functions Chapter 11 Week 13: Chapter12: Hash Algorithms Chapter 12, SHA Federal Publication FIPS 180-2 Week 14: Chapter13: Digital Signatures Chapter 13

Objectives In this course, we study the theoretical and practical aspects of network security. We start with a threat model, and describe vulnerabilities of computer networks to attacks by adversaries and hackers using a variety of techniques. We then study methods and techniques to circumvent or defend against these attacks and to minimize their damage. In this context, we study cryptographic techniques and protocols, network security protocols, digital signatures and authentication protocols, network security practice, and wireless network security.

Catalog Description Security attacks, mechanisms, and services. Network security and access security models. Overview of secretkey and public-key cryptography. Authentication protocols and key management. Network security practice. Email security. IP security and web security. Intrusion detection and prevention systems. Firewalls and virtual private networks. Wireless network security.

Topics Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for providing confidentiality, authentication, integrity, nonrepudiation, and access control. Cryptography in data and communication security. Secret-Key and Public-Key Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4. Modes of operation. Confidentiality using encryption. Key distribution. Random number generation. Hashes and message digests. One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems. Authentication: Overview of authentication systems. Authentication of people. Security handshake pitfalls. Strong password protocols. Digital signatures. One-way and mutual authentication protocols. Network Security Standards and Practice: Kerberos V4 and V5. PKI (Public Key Infrastructure). Real-time communication security. IPsec: SSL/TLS. Electronic mail security. S/MIME, and PGP (Pretty Good Privacy). Firewalls, Web security. Wireless Network Security: Wireless networking protocols and security issues. 802.11 protocols, attacks, and countermeasures

The Book W. Stallings. Cryptography & Network Security, Fourth Edition, Prentice Hall, 2005

More Information about the Book Prentice Hall Webpage for the Book

Grading Plan HW Assignments: 10 % Project: 10 % Lab 10 % First: 15 % Second: 15 % Final: 40 %

Prerequisites This class is open to undergraduate students in the last year.

Dr. Lo'ai A. Tawalbeh www.just.edu.jo/~tawalbeh E-Mail:[email protected] Tel: (00962)-2-720-1000-Ext. 22515 Office: E1 Level 3 28 July 2008

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.