How To Pass An Ece 646 Course



Similar documents
Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Table of Contents. Bibliografische Informationen digitalisiert durch

Computer Security: Principles and Practice

Cryptography and network security CNET4523

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CRYPTOG NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

CS 758: Cryptography / Network Security

Information Security and Cryptography

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

IT Networks & Security CERT Luncheon Series: Cryptography

Data Encryption and Network Security

CRIPT - Cryptography and Network Security

Network Security - ISA 656 Review

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS 5490/6490: Network Security Fall 2015

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

EECS 588: Computer and Network Security. Introduction

SE 4472a / ECE 9064a: Information Security

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CS 464/564 Networked Systems Security SYLLABUS

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Chapter 8. Network Security

Lecture 9: Application of Cryptography

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

EXAM questions for the course TTM Information Security May Part 1

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Cryptography & Network-Security: Implementations in Hardware

Cryptography and Network Security Chapter 10

Overview of Public-Key Cryptography

Common Syllabus Revised

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273

Introduction to Information Technology ITP 101x (4 Units)

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Challenges in Teaching a Graduate Course in Applied Cryptography

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

TELECOMMUNICATION NETWORKS

Practice Questions. CS161 Computer Security, Fall 2008

CS 3251: Computer Networking 1 Security Protocols I

Chapter 10. Network Security

An Introduction to Cryptography as Applied to the Smart Grid

CSci 530 Midterm Exam. Fall 2012

Introduction to Cryptography CS 355

Network Security Course Specifications

AESvisual: A Visualization Tool for the AES Cipher

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Wireless Mobile Internet Security. 2nd Edition

NETWORK ADMINISTRATION AND SECURITY

Digital Signature. Raj Jain. Washington University in St. Louis

Communication Security for Applications

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Lecture 9 - Network Security TDTS (ht1)

Network Security Essentials:

University of St. Thomas ENGR Digital Design 4 Credit Course Monday, Wednesday, Friday from 1:35 p.m. to 2:40 p.m. Lecture: Room OWS LL54

Cryptography & Digital Signatures

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: )

Lecture VII : Public Key Infrastructure (PKI)

Secure Sockets Layer

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

National Security Agency Perspective on Key Management

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

VALLIAMMAI ENGINEERING COLLEGE

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Curran, K. Tutorials. Independent study (including assessment) N/A

MS-55096: Securing Data on Microsoft SQL Server 2012

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Single Sign-On Secure Authentication Password Mechanism

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CPSC 467b: Cryptography and Computer Security

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Chapter 6 Electronic Mail Security

Mobile Network Security Technology Research Center Kyungpook National University

CS549: Cryptography and Network Security

Syllabus COMP 517 Computer Security Penn State Harrisburg Fall 2009

Advanced Topics in Cryptography and Network Security

Computer Engineering Graduate Handbook. Administered by the Computer Science and the Charles L. Brown Department of Electrical & Computer Engineering

Weighted Total Mark. Weighted Exam Mark

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Boston University MET CS 690. Network Security

Syllabus CIS 3630: Management Information Systems Spring 2009

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Transcription:

646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact: The Engineering Building, room 3225 kgaj@gmu.edu Office hours: Tuesday, 6:00-7:00 PM Thursday, 6:00-7:00 PM and by appointment MS CpE: NETWORK D SYSTEM SECURITY Advisors: Kris Gaj, Jens-Peter Kaps, Kai Zeng. 542 Computer Network Architectures and Protocols S.-C. Chang, et al. 2. 646 and Computer Network Security K. Gaj, J.-P. Kaps lab, project 3. 746 Advanced Applied J.P. Kaps, K. Gaj lab, project 4. ISA 656 Network Security R. Simon, A. Stavrou, D. McCoy 5. 747 (formerly 899) Cryptographic Engineering J.-P. Kaps MS CpE: COMPUTER NETWORKS Advisors: Brian Mark, Bijan Jabbari, S.C. Chang. 528 Introduction to Random Processes in 2. 542 Computer Network Architectures and Protocols 3. 642 Design and Analysis of Comp. Networks 4. 646 and Computer Network Security 5. 74 Wireless Networks 6. 742 High-Speed Networks MS EE: COMMUNICATIONS D NETWORKING security & applications performance network link physical Comp. Network Operating Systems Architectures CpE and Protocols CS 57 core Wireless Design & Analysis Networks of Networks EE core 542 CpE core Optoelectronics 565 642 Wireless & Networks 630 Statistical comm theory 528 EE core Theory Random Processes 633 Coding Theory 74 53 High-Speed Networks 742 73 732 Digital Mobile Network Security 646 746 CS 672 CS 756 Performance Analysis & Evaluation 737 Spread Spectrum 739 Satellite Lecture Homework 0 % Midterm exam 20 % Final Exam 25 % 646 Laboratory 0 % Project 35 % Specification - 5 % Results - 0 % Oral presentation - 0% Written report - 8% Review - 2%

Bonus Points for Class Activity Based on class exercises during lecture Small points earned each week posted on BlackBoard Up to 5 big bonus points Scaled based on the performance of the best student deapth For example:. Alice 2. Bob 28. Charlie Small points 40 36 8 Big points 5 4.5 Lecture viewgraphs / whiteboard viewgraphs available on the web (please, extend with your notes) books required (Stallings) optional (all chapters available on the book web page) articles (CryptoBytes, RSA Data Security Conf., CHES, CRYPTO, etc.) Homework optional assignments short programs vs. analytical problems or HDL codes ü More time consuming ü Most time spent on debugging ü Relatively straightforward ü Typically less time consuming ü More thinking ü Little writing web sites - Crypto Resources standards, FAQs, surveys Midterm exam Getting Help Outside of Office Hours ü 2 hours 40 minutes System for asking questions 24/7 ü multiple choice test + short problems Answers can be given by students and instructors ü open-books, 0 double-sided pages of notes Student answers endorsed (or corrected) by instructors Average response time in Fall 204 = 52 minutes You can submit your questions anonymously You can ask private questions visible only to ü practice exams (with solutions) available on the web Tentative date: Tuesday, November 3rd the instructors 2

Final exam ü 2 hours 45 minutes ü multiple choice test + short problems ü open-books, 0 double-sided pages of notes ü practice exams (with solutions) available on the web Tuesday, December 5 7:30 0:5 PM Laboratory labs based on two major software packages ü CrypTool ü GnuPG for Windows or GnuPG for Linux done at home or in the labs: software downloaded from the web based on detailed instructions grading based on written reports (answers to questions included in the instructions) original Project () useful Mixed Projects depth, originality based on additional literature you can start at the point where former students ended based on something you know and are interested in software, hardware, analytical, or mixed may involve experiments teams of -3 students 20% 20% 80% 60% Project (2) about three weeks to choose a topic and write the corresponding specification regular meetings with the instructor a few oral progress reports based on Power Point slides draft final presentation due at the last progress report short conference-style oral presentations contest for the best presentation written report/article, IEEE style publication of reports and viewgraphs on the web Project (3) Project reports/articles requirements - IEEE style - 5 pages maximum - appendices possible but do not influence the evaluation Review of project reports - initial version of the report due Saturday, Dec. 2 - reviews done by your colleagues - reviews due, Thursday, Dec. 7 - final version of the report due Saturday, Dec. 9 3

Project (4) Project presentations Friday, December 8, 4:00-9:00PM - conference style - open to general public (in particular, students from previous years), seminar credit - 0 minutes for the presentation + 5 minutes for Q&A - time strictly enforced - audience votes in the contest for the best project Contest for the best project Two independent categories: Results Presentation Scale: 0 = very poor to 0 = excellent Results Original & Correct analysis implementation & testing scheme Meeting Project goals Efficiency & security of the proposed/selected design/scheme Useful for other students & other members of the cryptographic community Presentation Motivation & background Clear and Concise presentation of main results Logical organization of the talk Quality of viewgraphs Answering questions Discussion of encountered problems Conclusions Awards (separate in each category) Types of Projects Typically Winning the Contest Fall 203 Fall 202 I award - 5 points II award - 3 points III award - point Fall 20 - - Fall 200-4

Winners of the Contest in Fall 204 Combining Projects from Two Different Courses 646 & 545 2 3 545 project: Hardware implementation of authenticated ciphers competing in the CAESAR contest 545 project can be extended into an 646 project by adding additional ciphers, architectures, key sizes, modes of operation, etc. 646 & 797/798/799/998 646 project can be extended into a Scholarly Paper, Research Project, Master s Thesis, PhD Thesis Typical course Follow-up courses difficulty and Computer Network Security 646 time difficulty This course Advanced Applied Digital System 746 Design with VHDL 545 Cryptographic Engineering 747 time Computer Arithmetic 645 Software/Hardware Codesign 699 and Computer Network Security Advanced Applied Modular integer arithmetic Operations in the Galois Fields GF(2 n ) Historical ciphers Classical encryption (DES, AES, cipher modes) Public key encryption (RSA, Diffie-Hellman) Hash functions and MACs Digital signatures Public key certificates Secure Internet Protocols - e-mail: PGP and S-MIME - www: SSL/TLS Cryptographic standards AES Stream ciphers Elliptic curve cryptosystems Random number generators Smart cards Attacks against implementations (timing, power, fault analysis) Efficient and secure implementations of cryptography Security in various kinds of networks (IPSec, wireless) Zero-knowledge identification schemes 5