사물네트워크 시스템 보안 - Focused on Advanced Cryptography-

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2010.
Understanding Networked Applications: A First Course Introduction to course by David G. Messerschmitt.
CMSC 456 Introduction to Cryptography
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Mr. Batchelor HP IT Essentials I & Honors level II New Version 4.1.
Computer Network Fundamentals CNT4007C
Calculus II Tools for Applied Mathematics. What to Remember from Calculus I The derivative of a function measures its instantaneous rate of change (slope)
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Introduction to Discrete Mathematics J. H. Wang Sep. 14, 2010.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Data Structures (Second Part) Lecture 1 Bong-Soo Sohn Assistant Professor School of Computer Science and Engineering Chung-Ang University.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Quantitative Methods in Geography Geography 391. Introductions and Questions What (and when) was the last math class you had? Have you had statistics.
Introduction to Operating Systems J. H. Wang Sep. 15, 2010.
Discrete Mathematics ( 離散數學 ) Ming-Jer Tsai. Outline What is Discrete Mathematics? Why learn Discrete Mathematics? What will be taught in the class? How.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
EE210 Digital Electronics Introductory Class March 13, 2008.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
HFT 4464 Hospitality Financial Management Summer B :00 – 9:50 p.m. Course Overview.
1 CSE Cryptography and Security Ten H. Lai Autumn 2009.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
{ COMI Thursday night 5:30 – 10:30 Room 6054.
Computer Network Fundamentals CNT4007C
Introduction to Operating Systems
Security Outline Encryption Algorithms Authentication Protocols
Course Introduction 공학대학원 데이타베이스
Introduction to Information Security
Introduction to Information Security
NWEN 243 Network Applications
Discrete Math II - Introduction -
Data Mining - with Tensorflow, datamining and deep learning -
ISE 313 Computer Integrated Manufacturing and Automation
Cryptography and Network Security
CPSC 441: Computer Communications
INTERNATIONAL BURCH UNIVERSITY
COMI Friday 9:00 – 1:50 Room 2108.
Cpt S 471/571: Computational Genomics
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Cryptography and Computer Security for Undergraduates
CAS CS 538 Cryptography.
ISA 562 Information Security Theory and Practice
The Secure Sockets Layer (SSL) Protocol
ELT & Vocabulary Learning
Chapter 1 Basic Concepts.
V. Arun College of Information and Computer Sciences
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
INFS 522 – Computer Systems Concepts
Information Systems in Organizations Introduction MIS 2101 Sec 001 E
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Pima Medical Institute Online Education
One Time Signature.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
EE323 Computer Networks Song Chong Course Introduction.
Digital Signal Processing Spring, 2019
Cryptography Lecture 27.
EEC 688/788 Secure and Dependable Computing
Presentation transcript:

사물네트워크 시스템 보안 - Focused on Advanced Cryptography- Howon Kim 2017. 9.4

About this course… Course name : 사물네트워크 시스템 보안(Security for IoT components and systems) In this course, students will learn about fundamental cryptography for IoT components and IoT systems. Students will also learn about basic cryptography and its security applications as follows: Mathematical background for cryptography, Fundamentals on private key/public key cryptography, Pseudo-randomness, digital signature, key establishment protocols, efficient implementations of public key cryptography, etc. Many parts of this class were already taught to students at undergraduate course (computer security class). However, from this class, we will learn about the cryptography in detail and in depth.

About this course… Main Textbook Time & Classroom Reference: 6/15/2018 About this course… Main Textbook Handbook of Applied Cryptography Freely downloadable at : http://cacr.uwaterloo.ca/hac/ Time & Classroom 18:00 PM~ 21:00 PM (Monday), A06-513 (Seminar Room) Reference: Introduction to Modern Cryptography by Katz

Course Schedule Chapter 1 - Overview of Cryptography 6/15/2018 Chapter 1 - Overview of Cryptography  Chapter 2 - Mathematics Background Chapter 3 - Number-Theoretic Reference Problems  Chapter 4 - Public-Key Parameters  Chapter 5 - Pseudorandom Bits and Sequences  Chapter 6 - Stream Ciphers  Chapter 7 - Block Ciphers  Chapter 8 - Public-Key Encryption  Chapter 9 - Hash Functions and Data Integrity Chapter 10 - Identification and Entity Authentication  Chapter 11 - Digital Signatures  Chapter 12 - Key Establishment Protocols  Chapter 13 - Key Management Techniques  Chapter 14 - Efficient Implementation 

Course Operations 6/15/2018 In this class, one or two students do presentation according to the class schedule. The remaining students listen to the presentation and participate in the discussion. I envision the following roles and responsibilities for the participants in this class Professor Coordinate the class operation and participate the class, but does not lead the class (a few questions will be given to the presenter) Assists student presenter for understanding the topic, etc. Student (Presenter) Read the assigned topic and surveys the relevant topics, and make presentation file Present the prepared topic and leads discussion Remaining Student Preview the assigned topic and participate in discussions

About this course… Grading Policy 점 수 항 목 5 Attendance /Attitude 40 6/15/2018 Grading Policy 점 수 항 목 5 Attendance /Attitude 40 Mid-Term Exam. Final Exam. 15 Homework 100 Total