CPE 542 Cryptography &Network Security Summer Term 2008 - 3 Credits Jordan University of Science and Technology http://www.just.edu.jo/~tawalbeh/cpe542.html
Announcements Schedule and Classroom: Sun-Tue-Thru 1:15-2:15 PM. Class Room: A2124. In order to view or print the PDF files, you need Adobe Acrobat Reader. Make sure that you install the most recent version of Acrobat Reader in your computer, otherwise, you may not be able to view or print the documents found on this site. Project Details are posted on the web Why should you care about this class? Read this article. (Published in IEEE Computer.) My office hours: Mon, Wed 9:45-11:15 AM, Tue: 2:15-3:15 PM, or by appointment. My office: E1 Level 3 Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Mon, Tue 1:30-2:30 PM Alice and Bob: Security's inseparable couple. Please read chapter 1 from the text book. Overview and Chapter 2 slides are now posted. HW1 is now posted on the web. HW2 is now posted on the web. First Exam details are posted now. HW3 is now posted on the web. Check this AES Flash. Sample Exam- Summer 2005 first exam Please if you have any questions, about HW3, come to ask me in my office. Please have a look to the summer 2005 projects to get idea of what you are supposed to do. The make up for the first exam for the excused students will be in Thursday 24-11-05 from 3:15-4:15, ROOM: E2011. HW5 is now posted Sample Second Exam- Summer 2005 second exam The project report/presentation are extended to Friday 16/12 at 6:00 pm. Please send it to
[email protected] Important: Please fill the EVALUATION and put it in the envelope attached to the door of my office. Thanks Check the certificate provided in the lab section. Presentations: If your name is shown below, please be prepared to present your work in 10-15 minutes.: Mohammad Hajjat & Mohammad Abu Zetoon: Implementation of DES, AES, RSA Alaa Alzayadeen, MOhammad Abu Atmeh : Security Enhanced Linux For Thursday Ola Amayri & Boran Altal: Secure Email. Samir Ghishan & Ali Alomari: Secure Wireles Payment Protocol Naser Saleh & Sabri Bagi: Security Holes in Microsoft Outlook Ghassan Rayyashi & Mahmoud Alabed: Kerberos Authentication Protocol Ahmad Shatnawi & Hazim Elne'washi : Image Steganopgraphy---Back up Required sections form the final material :9.1, 9.2, 10.1, 10.2,10.3, 11.1, 11.2, 11.3, 11.4, 12.2,12.4, 13.1, 13.3 The presentations required in the final exam are: Firewalls, Network Security, Bluetooth, Viruses/Worms.
Grades Grades
Project Project Requirements The title and abstract are due the 4th week Every body is required to submit a report and prepare a 10-15 minutes presentation for the project. The report and presentation due date will be in the last week of classes. Please send it to
[email protected] Summer 2005 Projects
The Lab Schedule and Lab Room: Sun, Wed: 2:15-5:15 PM., in LAB1 Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Tue, Thru : 10:00-11:00 AM Lab 1 Slides Certificate
Exams First Exam: 11/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: Chapter2, except section 2.4. Chapter3, except Linear Attack. Second Exam: 27/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: 5.1, 5.2, 6.1, 6.2, 7.1, 7.2, 7.3, 7.4
Homework Assignments HW1 - : Search the web and find 6 major computer and/or network security companies and identify a product from each company. Provide the following: 1. URL of the company website, 2. URL of the product website, 3. A brief description of the product (one paragraph in your own words). Selected Solutions by Ghassan Rayyashi HW2 - : Please solve the following problems from Chapter 2: Review Problems: 2.3, 2.7, 2.11 Problems: 2.4, 2.6, 2.10 Selected Solutions by Mohammad Hajjat HW3 - : Please solve the following problems from Chapter 3: Review Problems: 3.3, 3.7, 3.8 Problems: 3.7, 3.9, 3.12, 3.16 Selected Solutions by Ahmad Shatnawi HW4- please solve the following problems from chapter 5 in the text book-page 168: -- Submit using Moodle; Review problems: 5.3, 5.9, 5.13. Problems: 5.3, 5.6 - Selected Solutions by Hanadi Obeidat HW5- : please solve the following problems from chapter 6 in the text book: -- Submit using Moodle; Review Problems: 6.1, 6.2, 6.4, 6.6 page 197 . Problems: 6.1, 6.2, 6.4 page 199 Selected Solutions by Simsam Hijjawi All homework assignments are submitted by email to :
[email protected]. Please name your file as your last name followed by homework number, for example, tawalbeh-hw1.pdf. Also make sure that your name is printed within the homework file. Late HWs are not accepted
Course Plan Week 1: Introduction and Basic Concepts: Introduction ; Some Basic Number Theory Weeks 2, 3: Chapter 2: Classical Encryption Techniques Chapter 2 Weeks 4, 5: Chapter 3: Block Cipher and DES Chapter 3 Weeks 6,7: Chapter 5: Advanced Encryption Standard (AES) Chapter 5 Federal Publication (AES) FIPS-197 Week 8: Chapter 6: Contemporary Symmetric Chiphers Chapter 6 Week 9: Chapter 7: Confidentiality Using Symmetric Encryption Chapter 7 Week 10:Chapter 9: Public Key Cryptography and RSA: Chapter 9 Week 11: Chapter 10: Key Management; Other Public Key Cryptosystems Chapter 10 Week 12: Chapter11: Message Authentication and Hash Functions Chapter 11 Week 13: Chapter12: Hash Algorithms Chapter 12, SHA Federal Publication FIPS 180-2 Week 14: Chapter13: Digital Signatures Chapter 13
Objectives In this course, we study the theoretical and practical aspects of network security. We start with a threat model, and describe vulnerabilities of computer networks to attacks by adversaries and hackers using a variety of techniques. We then study methods and techniques to circumvent or defend against these attacks and to minimize their damage. In this context, we study cryptographic techniques and protocols, network security protocols, digital signatures and authentication protocols, network security practice, and wireless network security.
Catalog Description Security attacks, mechanisms, and services. Network security and access security models. Overview of secretkey and public-key cryptography. Authentication protocols and key management. Network security practice. Email security. IP security and web security. Intrusion detection and prevention systems. Firewalls and virtual private networks. Wireless network security.
Topics Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for providing confidentiality, authentication, integrity, nonrepudiation, and access control. Cryptography in data and communication security. Secret-Key and Public-Key Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4. Modes of operation. Confidentiality using encryption. Key distribution. Random number generation. Hashes and message digests. One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems. Authentication: Overview of authentication systems. Authentication of people. Security handshake pitfalls. Strong password protocols. Digital signatures. One-way and mutual authentication protocols. Network Security Standards and Practice: Kerberos V4 and V5. PKI (Public Key Infrastructure). Real-time communication security. IPsec: SSL/TLS. Electronic mail security. S/MIME, and PGP (Pretty Good Privacy). Firewalls, Web security. Wireless Network Security: Wireless networking protocols and security issues. 802.11 protocols, attacks, and countermeasures
The Book W. Stallings. Cryptography & Network Security, Fourth Edition, Prentice Hall, 2005
More Information about the Book Prentice Hall Webpage for the Book
Grading Plan HW Assignments: 10 % Project: 10 % Lab 10 % First: 15 % Second: 15 % Final: 40 %
Prerequisites This class is open to undergraduate students in the last year.
Dr. Lo'ai A. Tawalbeh www.just.edu.jo/~tawalbeh E-Mail:
[email protected] Tel: (00962)-2-720-1000-Ext. 22515 Office: E1 Level 3 28 July 2008