Cryptography and network security CNET4523



Similar documents
CS 5490/6490: Network Security Fall 2015

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSCI 454/554 Computer and Network Security. Final Exam Review

Gujarat University Syllabus M.Tech (Networking & Communications) II

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

CRYPTOG NETWORK SECURITY

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

CRYPTOGRAPHY AND NETWORK SECURITY

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Chapter 7 Transport-Level Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Chapter 10. Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 8. Network Security

Standards and Products. Computer Security. Kerberos. Kerberos

NETWORK ADMINISTRATION AND SECURITY

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Lecture 9 - Network Security TDTS (ht1)

IT Networks & Security CERT Luncheon Series: Cryptography

EXAM questions for the course TTM Information Security May Part 1

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CS 356 Lecture 28 Internet Authentication. Spring 2013

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Introduction to Security and PIX Firewall

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security Essentials:

Secure Sockets Layer

Protocol Security Where?

How To Protect Your Data From Attack

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Weighted Total Mark. Weighted Exam Mark

CS 494/594 Computer and Network Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Network Security. Lecture 3

ICTTEN8195B Evaluate and apply network security

This section provides a summary of using network location profiles to identify network connection types. Details include:

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

CRIPT - Cryptography and Network Security

Network Security Part II: Standards

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Communication Security for Applications

IPsec Details 1 / 43. IPsec Details

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Lecture 10: Communications Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Implementing Cisco IOS Network Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

VALLIAMMAI ENGINEERING COLLEGE

Internet Protocol Security IPSec

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Network Security Essentials Chapter 5

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Authentication Types. Password-based Authentication. Off-Line Password Guessing

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Network Security Fundamentals

Cryptography and Network Security

Lecture 10: Network Security Protocols

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Chapter 32 Internet Security

T Cryptography and Data Security

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Transport Level Security

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Curran, K. Tutorials. Independent study (including assessment) N/A

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Implementing and Managing Security for Network Communications

TABLE OF CONTENTS NETWORK SECURITY 2...1

How To Understand And Understand The Security Of A Key Infrastructure

Chapter 6 Electronic Mail Security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Table of Contents. Bibliografische Informationen digitalisiert durch

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

, ) I Transport Layer Security

Internetwork Security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Chapter 8 Virtual Private Networking

Client Server Registration Protocol

Bit Chat: A Peer-to-Peer Instant Messenger

CSE/EE 461 Lecture 23

Virtual Private Networks: IPSec vs. SSL

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Transcription:

1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local networks and public networks particularly the Internet has raised concerns over security since large volumes of personal, sensitive data and information are now frequently transferred. This module is intended to provide the student With a good understanding of range of network security issues and the methods available to reduce their effects. This module is essential in the preparation of students for future professional career or further study. 5. Semester and Year offered 1/4 6. Total Student Learning Face to Face Total Guided and Independent Learning Time (SLT) L = Lecture T = Tutorial L T P O Independent = 84 Total =126 P = Practical O= Others 28 14 7. Credit Value 3 8. Prerequisite (if any) Computer network CNET3513 9. Objectives: To provide solid foundation of the principal of Cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithm. To provide an awareness of network security issues involving stand alone computers, locally networked computers and remotely networked computers; To encourage investigation into what factors are likely to result in successful network security To provide foundations of the basic system security testing for vulnerabilities and procedures of backup and recovery; 10. Learning outcomes: On successful completion of the module, students will be able to: Identify common network security vulnerabilities/attacks explain the foundations of Cryptography and network security Critically evaluate the risks and threats to networked computers. Demonstrate detailed knowledge of the role of encryption to protect data. Analyze security issues arising from the use of certain types of technologies. Identify the appropriate procedures required to secure networks. Identify the appropriate procedures required for system security testing and procedures of Backup and recovery. 11. Transferable Skills: Demonstrate detailed knowledge of the role of encryption to protect data. Exercise judgments on the selection of security processes. Demonstrate a good knowledge of the procedures used to secure networks. Professionally communicate about Cryptography and network security with others. Page 1 of 5

Topic 1 Indep. Total 12. Teaching-learning and assessment strategy A variety of teaching and learning strategies are used throughout the course, including: Classroom lessons. Lectures and Power Point presentations Tutorial sessions: Practice exercises brainstorming; student-lecturer discussion collaborative and co-operative learning; Independent study. Assessment strategies include the following: Ongoing quizzes Midterm tests Performance Assessment (project, Assigned exercises) Lecturer Observation 13. Synopsis: This module provides ranges of network security issues and the methods available to reduce their effects. It will explore many aspects of network security, including Common network security vulnerabilities/attacks, Types of Cryptographic Functions, Authentication Systems, security standards, firewalls and Network management security. 14. Mode of Delivery: Classroom lessons and Tutorial sessions 15. Assessment Methods and Types: The assessment for this course will be based on the following: Coursework 50% Quizzes 10% Assignments 20% Mid-Semester Exam 20% Final Examination. 50%. 100% 16 Mapping of the course/module to the Programme Aims A1 A2 A3 A4 A5 A6 A7 A8 A9 4 4 4 1 5 1 1 2 0 17. Mapping of the course/module to the Programme Learning Outcomes LO1 LO2 LO3 LO4 LO5 LO6 LO7 LO8 LO9 LO10 LO11 LO12 4 3 2 1 2 5 1 2 2 1 0 0 18. Content outline of the course/module and the SLT per topic SLT Details L T INTRODUCTION The History of Information Security, Classical encryption techniques, Internet Crime and computer security threats, Identify attacks as opposed to valid traffic, Common network security vulnerabilities/attacks, Viruses, Worms, Trojan Horses.. Threats from portable code (Plug-ins, Active X, Visual Basic, Java, JavaScript, Flash, Shockwave), Legal Issues. The Multilevel Model of Security, 2 1 6 9 Page 2 of 5

Topic 3 Topic 2 CRYPTOGRAPHY Introduction to Cryptography, Types of Cryptographic Functions. Secret Key Cryptography Generic Block Encryption. Data Encryption Standard (DES). International Data Encryption Algorithm (IDEA). Advanced Encryption Standard (AES). Modes of Operation. Encrypting a Large Message. Generating MACs. Multiple Encryption DES. CBC Outside vs. Inside. Hashes and Message Digests. Introduction. Nifty Things to Do with a Hash. MD2. MD4. MD5. SHA-1. HMAC. 6 3 18 27 Public Key Algorithms. Introduction. Modular Arithmetic. RSA. Diffie-Hellman. Digital Signature Standard (DSS). How Secure Are RSA and Diffie-Hellman? Elliptic Curve Cryptography (ECC). Zero Knowledge Proof Systems. Number Theory. Introduction. Modular Arithmetic. Primes. Euclid's Algorithm. Chinese Remainder Theorem. Zn. Euler's Totient Function. Euler's Theorem. AUTHENTICATION Overview of Authentication Systems. Password-Based Authentication. Address-Based Authentication. Cryptographic Authentication Protocols. Who Is Being Authenticated? Passwords as Cryptographic Keys. Eavesdropping and Server Database Reading. Trusted Intermediaries. Session Key Establishment. Delegation Security Handshake Pitfalls. Login Only. Mutual Authentication. Integrity/Encryption for Data. Mediated Authentication (with KDC). Nonce Types. Strong Password Protocols. Introduction. Lamport's Hash. Strong Password Protocols. Strong Password Credentials. Strong Password Credentials Download Protocols Page 3 of 5

Topic 7 Topic 6 Topic 5 Topic 4 STANDARDS Kerberos V4. Tickets and Ticket-Granting Tickets. Configuration. Logging Into the Network. Replicated KDC's. Realms. Interrealm Authentication. Key Version Numbers. Kerberos V5. ASN.1. Names. Delegation of Rights. Ticket Lifetimes. Key Versions.. Cryptographic Algorithms. Hierarchy of Realms. Evading Password-Guessing Attacks. Double TGT Authentication. Kerberos V5 Messages. PKI (Public Key Infrastructure). Terminology. PKI Trust Models. Revocation. Directories and PKI. PKIX and X.509. X.509 and PKIX Certificates. Authorization Futures. Real-time Communication Security. Session Key Establishment. Perfect Forward Secrecy. PFS-Foilage. Denial-of- Service/Clogging Protection. Endpoint Identifier Hiding. Live Partner Reassurance. Session Resumption. Plausible Deniability IPsec: AH and ESP. Overview of Ipsec. IP and Ipv6. AH (Authentication Header). ESP (Encapsulating Security Payload). Comparison of Encodings. IPsec: IKE. Photuris. SKIP. History of IKE. IKE Phases. Phase 1 IKE. Phase - 2 IKE: Setting up Ipsec Sas. ISAKMP/IKE Encoding. 6 3 18 27 SSL/TLS. Introduction. Using TCP, SSL/TLS Basic Protocol. Session Resumption. Client Authentication. PKI as Deployed by SSL. Version Numbers. Negotiating Cipher Suites. Negotiating Compression Method. Attacks Fixed in v3. Exportability. Encoding. Electronic Mail Security Distribution Lists. Store and Forward. Security Services for Electronic Mail. Establishing Keys. Privacy. Authentication of the Source. Message Integrity. Non- Repudiation. Message Flow Confidentiality. Anonymity. Containment. Annoying Text Format Issues. Names and Addresses. PEM & S/MIME. PGP (Pretty Good Privacy). FIREWALLS Packet Filters. Application Level Gateway. Encrypted Tunnels. Comparisons. Why Firewalls Don't Work. Denial-of-Service Attacks. Other Security Systems NetWare V3. NetWare V4. KryptoKnight. DASS/SPX. Lotus Notes Security. DCE Security. Microsoft Windows Security. Network Denial of Service. Clipper. Network management security Basic Concepts of SNMP, SNMPv1 Community Facility, SNMPv3. Testing for system security vulnerabilities; Backup and recovery procedures; The OSI Security Architecture 2 1 6 9 Total hours 28 14 84 126 Page 4 of 5

19. Main references supporting the course: William Stallings, Cryptography and Network Security: International Edition, Prentice Hall, 2008. William Stallings, Network Security Essentials: Applications and Standards: International Edition, Prentice Hall, 2008. Additional references supporting the course: Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2002 20. Other additional information All materials will be available to the students online. Page 5 of 5