Cryptography and Network Security - CSE 4383 / 6383 [PDF]

Lecture Slides (PDF), Symmetric Cryptography · Lecture Slides ... A Course in Number Theory and Cryptography, Neal Kobli

18 downloads 33 Views 98KB Size

Recommend Stories


[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Download PDF Cryptography And Network Security
Where there is ruin, there is hope for a treasure. Rumi

Read PdF Cryptography and Network Security
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Read PDF Cryptography and Network Security
Don't count the days, make the days count. Muhammad Ali

Security Issues on Cryptography and Network Security
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

PdF Download Cryptography and Network Security: Principles and Practice
The wound is the place where the Light enters you. Rumi

Review PdF Cryptography and Network Security: Principles and Practice
If you are irritated by every rub, how will your mirror be polished? Rumi

Idea Transcript


CSE 4383/6383 Cryptography and Network Security Spring 2015 Session

Instructor

3:30 - 4:45, M,W

Office Hours M 10-12 W 10-12 Other times by appointment

Mahalingam Ramkumar 315 Butler, Ph: 5-8435

Overview Syllabus Course Policies Quizzes/Assignments Take home Quiz 1: Symmetric Crypto Due 11 Feb Take home Quiz 2: Number Theory Due 16 Feb Midterm: Midterm Due 23 Mar 3:30 pm Finals: Finals Due 3 May 11:59 pm Download Link for Aribas Use Aribas for Asymmetric crypto assignments.

Lecture Slides Lecture Slides (PDF), Introduction Lecture Slides (PDF), Symmetric Cryptography Lecture Slides (PDF), Stream and Block Ciphers Lecture Slides (PDF), DES Lecture Slides (PDF), Symmetric Crypto (Continued) Lecture Slides (PDF), Elementary Number Theory Lecture Slides (PDF), Asymmetric Cryptography Lecture Slides (PDF), Key Distribution Lecture Slides (PDF), PGP Kerberos (PDF) Lecture Slides (PDF), Network Security Lecture Slides (PDF), Web Security Lecture Slides (PDF), IPsec Lecture Slides (PDF), Wireless Security Lecture Slides (PDF), Intrusion Detection Lecture Slides (PDF), Wily Hacker Lecture Slides (PDF), Firewalls Cryptography Review Overview of Security Protocols Overview This course will introduce private and public key encryption, key distribution (Kerberos, public key infrastructure), cryptographic hash functions, digital signatures, IP Security (IPSec), Secure Socket Layer (SSL/TLS), DNS Security (DNSSEC), WEP/WPA intrusion detection, Firewalls, denial of service, phishing, and an overview of many attacks that the Internet has experienced, especially in the last decade.

Text (not required) : Cryptography and Network Security, Third Edition, by William Stallings, Prentice Hall, 2003

Additional References 1. Cryptography, Theory and Practice, Douglas R. Stinson, 2nd Edition, CRC Press. 2. A Course in Number Theory and Cryptography, Neal Koblitz 3. Supplemental material that will be provided by the instructor in electronic form - usually in pdf format.

Syllabus (Subject to change) Dates

Topic

Week 1

Overview of Security, Introduction to Cryptography, Classical Cryptography

Week 2-3

Symmetric Cryptography, Quiz 1

Weeks 4-5

Asymmetric Cryptography, Quiz 2

Week 6-7

Key Distribution, PKI, Kerberos, PGP, Quiz 3 Midterm

Week 8

Review of TCP/IP networks

Week 9-11

Web Security - SSL, PGP, SET, DNSSEC, Quiz 4

Week 12-13

IPSec, WEP/WPA, IEEE 802.2, Quiz 5

Week 14

Other Topics - Intrusion Detection, DoS, Firewalls

Week 15

Review Finals

Course Policies Grade determination Quizzes/Assignments

40%

Exams

40%

Term Paper

10%

Participation

10%

Course Requirements and Grading Policy 1. All students will be expected to sign an attendance sheet for every class. 2. The student could be tested on any material provided in the reference text and supplemental material provided by the instructor. Material beyond the scope of this course in the text and supplemental material will be explicitly pointed out by the instructor. 3. Midterm and final exams will be comprehensive (one cheat sheet will be permitted). 4. All material submiited by electronic means should be in ASCII or in pdf format. 5. Graduate students may be required to answer additional questions in quizzes and exams.

Academic Honesty Unless explicitly specified, it is to be understood that all homework assignments and tests are to be performed without collaboration. The departments academic honesty policy applies to this class and can be found here .

Add / Drop Policy Add/drop without penalty

A student has through the fifth class day into the semester to add a course and through the tenth class day to drop a course without being assessed a fee or academic penalty.

Drop after the tenth class day through the 30th class day into the semester

A student cannot drop courses after this period except in documented cases of serious illness, extreme hardship, or failure of the instructor to provide significant assessment of his/her performance. A request to drop a course during this period must be approved by the student's adviser and academic dean. The dean who permits the drop will specify its effective date. A student receiving permission to drop will receive a W on his/her academic record and be assessed a fee.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.