CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz

Slides:



Advertisements
Similar presentations
Computer Science Department
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
Winter 2008Logistics1 Advanced Computer Networks Prof. Venus W. Samawi Welcome to Time: 2pm –5pm Tuesday Winter credits.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
EECS 354 Network Security Introduction. Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
ECEN 248: INTRODUCTION TO DIGITAL DESIGN
@Yuan Xue CS 285 Network Security Fall 2008.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Course Overview 1 FCM 710 Architecture of Secure Operating Systems Prof. Shamik Sengupta Office 4210 N
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles Course administration.
Virtual Private Networks and IPSec
Computer Network Fundamentals CNT4007C
Introduction to Operating Systems
B504/I538: Introduction to Cryptography
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
CS101 Computer Programming I
Principles of Computer Security
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
CS/ECE Applied Cryptography Dr. Attila Altay Yavuz
Computer Networks CNT5106C
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Information Security
Introduction to Information Security
Mobile Ad hoc Networks (Spring 2003)
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Chapter 8 Network Security.
CS410: Text Information Systems (Spring 2018)
Cryptography Lecture 1.
FINAL EXAM INFORMATION
Cryptography and Network Security
Computer Networks CNT5106C
CS/ECE 418 Introduction to Network Security
Chapter 8 Network Security.
Introduction to the course
CNT 4704 Analysis of Computer Communication Networks
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Accelerated Introduction to Computer Science
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Lecture 10: Network Security.
Course Overview and Organization
Introduction to Cryptography
ECS 152B Computer Networks Winter 2010
Computer Networks CNT5106C
Advanced Computer Networks
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Network Security Chapter 8.
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
Cryptography and Network Security
CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena
Cryptography Lecture 27.
AME Spring Lecture 11 - Thrust and aircraft range
Overview and Introduction (Lecture Contents Summary)
Presentation transcript:

CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz Course Overview and Organization Introduction to Network Security Dr. Attila Altay Yavuz Spring 2018

High-Level Objectives Cryptographic primitives and Net. Sec. foundations: Essential cryptographic building blocks Their properties and use Basic Service: Authentication and Handshakes Primitives Protocols Key Management and Establishment Protocols Network Security Protocols Selected Advanced Topics

Pre-reqs and Grading Required: Good C/C++ programming CS 372 and CS 321 Desirable but not required: Previous security courses CS 370 or CS 427 Grading: No mid-term or final! 5 Homeworks (10% each): 50% total HWs are research-oriented (10 days each) 3-4 Mini-projects in form of labs: 50% total You will have access to remote Virtual Machines (VMs) to work Implementation of network security protocols with crypto libraries Around 2-weeks duration each Extra credit quizzes (e.g., 7-8%)

Topics – Syllabi Outline – TENTATIVE TIMING Week 1-2: Hash-based primitives and Net. Sec. Tools Week 3-4: Preparation for Network Security Protocols Symmetric Primitives: DES and AES (not covered in CS 427) Key Exchange: DH and Certificates (quick recap with some number theory) Encryption/Authentication: Elgamal, Schnorr, DSA, (not covered in CS 427) Week 4-5-6: Net. Sec. Protocols Handshake principles, replay attacks, etc.. Needham-Schroeder, Otway-Rees, Kerberos, Station-to-Station protocol, common mistakes Week 6-7: Net. Sec. Protocols SSL/TLS IPSec, Basic Cloud Security Week 7-8: Key Management and Establishment: IoT Key Distribution Group Key Establishment: GDH protocols Group Key Management: Iolus, Logical Key Hierarchy, Key Trees Week 9: Privacy in Cloud and Emerging Wireless Systems Searchable Encryption for Cloud Storage: Privacy versus data utilization dilemma Location-Privacy in Cognitive Radio Networks Week 10: Selected Topics in Emerging Network Security

Pre-reqs and Grading Homeworks (5 HWs, each has generally 5-6 questions): Some asks you to dig deeper in topics covered in class Some complements topics not covered in class: Research-based questions Some involve a proof or algorithm analysis Mini-projects (3-4 lab assignments) ZeroMQ network package to connect processes, remote access for implementation MIRACL cryptographic library for protocol implementation Counter Denial of Service Tool Implement a client-server puzzle with client-server model Authentication at Post-Quantum Era Implement a simple multiple-time hash based signature A Secure Digital Forensic Tool: Loss/Compromise Resilient Logger Implement forward-secure and aggregate authentication for logs Compression and information dispersal for network resiliency Implement your mini TLS Implement an authenticated TLS handshake with certificates and ECC Crypto

Logistics and Notes Instructor Office Hours and Course Webpage: Tuesday 2:00 – 4:00 PM (to be updated), KEC 3065 http://web.engr.oregonstate.edu/~yavuza/ Class email (important!) and in-class announcement Your TA and Office Hours: Mr. Rouzbeh Behnia, John 125 Monday and Wednesday, 12:00 – 1:30 PMs (extra grading hours will be hold). Grading and assignment related questions go to TA, everything else is me. A protocol and cryptography oriented approach to network security This is not a system security course! No hacking, etc… Plenty of protocols, coding and cryptography! Instructor Travels 2 weeks of travel (out of state and out of US) 1 week will be covered by guest faculty 1 week will be covered by TA

Extra Resources (not required but optional) No textbook is required. Lecture slides and reading papers will be provided at course website.  However, some optional books that may be useful: Charlie Kaufman, Radia Perlman, and Mike Speciner, “Network Security: Private Communication in a Public World”, Second Edition, Prentice Hall. (some slides and assignments are from this book) Douglas R. Stinson, “Cryptography Theory and Practice, 3rd edition". Jonathan Katz & Yehuda Lindell , “Introduction to Modern Cryptography”. Free online cryptography resources: Lecture notes of Dr. Mihir Bellare: https://cseweb.ucsd.edu/~mihir/cse207/classnotes.html "The Joy Cryptography" from Dr. Mike Rosulek: http://web.engr.oregonstate.edu/~rosulekm/crypto/