Cryptography and Computer Security for Undergraduates

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Standards Alignment A study of alignment between state standards and the ACM K-12 Curriculum.
1 Undergraduate Curriculum Revision Department of Computer Science February 10, 2010.
Why Computing? Single most important skill for the 21 st century (and beyond) Computing ≠ Programming Skills for enabling technology Solving Problems!
Teaching Courses in Scientific Computing 30 September 2010 Roger Bielefeld Director, Advanced Research Computing.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Department of Mathematics and Computer Science
Panel: Mathematics in CS Iowa Undergraduate Computer Science Consortium October 2005.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
4 August st Century Computing Curricula 1 Richard J. LeBlanc, Jr. Professor, College of Computing Georgia Institute of Tech nology Atlanta, Georgia,
The College of Information Sciences and Technology ist.psu.edu.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Design of a Software Development Major Alan Fekete Bob Kummerfeld (University of Sydney)
Structure of Study Programmes
Information Security and Computer Systems: An Integrated Approach Mark A. Holliday and Bill Kreahling, Dept of Mathematics and Computer Science Western.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
Computer Science Department 1 Undergraduate Degree Program Computer Science Chair Dr. Kurt Maly.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Information Science &Technology at Mercer University.
Cryptography and Computer Security for Undergraduates Paul De Palma Gonzaga University Gonzaga University Charles Frank Northern Kentucky University Northern.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Implementation of Innovations at FSMN by Miroslav Ćirić & Predrag Krtolica.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
CS Curriculum Changes Fall, BS Computer Science 2015 COMPUTER SCIENCE COURSES—64 Hours COMPUTER SCIENCE CORE (48 Hours) CS 258Intro to Object-Oriented.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Information Science &Technology at Mercer University August 22, 2001.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Stacey Levine. History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography.
1 Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas (UTD) January 22, 2016.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Industry Advisory Board
BEng(CompSc) Curriculum Structure & Highlights
Chuck Frank Northern Kentucky University
Introduction to Information Security
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Introduction to Information Security
사물네트워크 시스템 보안 - Focused on Advanced Cryptography-
Computer Science Courses
Information Science &Technology at Mercer University
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
CNT 4704 Computer Communication Networking (not “analysis”)
Big Numbers: Mathematics and Internet Commerce
Neeraj Mittal September 29, 2017
Efficient CRT-Based RSA Cryptosystems
ACM/IEEE-CS Computer Science Curriculum
Public Key Infrastructure
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CAS CS 538 Cryptography.
Security in Network Communications
Chuck Frank Northern Kentucky University
The Application of Elliptic Curves Cryptography in Embedded Systems
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Cybersecurity and Data Encryption
Computer Science Section
Undergraduate Degree Program
Computer Science Courses in the Major
Proposed Changes for and beyond
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York sgladfelter@psu.edu www.yk.psu.edu/~sg3 March 4, 2004

Course Overview Introductory course Team taught, multidisciplinary Pre-requisites 5th semester standing (juniors) Completed college algebra Minimal computing experience (user) Multidisciplinary team (history, math, computer science) IST students have taken a discrete math course (with a 4- credit calculus pre-requisite) No programming experience needed (want to attract a broad audience) IST students CS1 Most students have taken CS1 March 4, 2004 ACM SIGCSE - Norfolk, VA

Course Content “Computing is a broad field that extends beyond the boundaries of computer science” (CC2001) Science, Technology & Society www.yk.psu.edu/~sg3/sts497a Bibliography of resources According to CC2001…..we structured our course in that spirit March 4, 2004 ACM SIGCSE - Norfolk, VA

Course Content Strong historical component Mathematics Number theory Relevant math as needed to discuss RSA & PGP Computer Science Tie together and implement Historical algorithms History Where crypto fits into the “big picture” Evolution of cryptography Mathematics Glassy-eyed students (RSA proof) Computer science Students use software to experiment with historical algorithms & math Students write programs to implement algorithms (choose as homework) March 4, 2004 ACM SIGCSE - Norfolk, VA

Where Does This Course “Fit” in CS/IST Curriculum? Elective Support course Fulfill general education requirements March 4, 2004 ACM SIGCSE - Norfolk, VA

How is cryptography integrated into CS/IST curriculum? CS0 / IST Intro Programming / Algorithms Network security / Wireless Database / Mobile technologies Web technologies / E-commerce Integrate whenever and where ever possible – don’t teach crypto in isolation Core courses CS0/IST intro Hacking passwords Social engineering Programming Easy to implement simple applications as soon as can handle strings/arrays March 4, 2004 ACM SIGCSE - Norfolk, VA

CC2001 - Cryptography Topics AL9. Cryptographic algorithms [elective] Topics: √ Historical overview of cryptography √ Private-key cryptography and the key-exchange problem √ Public-key cryptography √ Digital signatures Security protocols Applications (zero-knowledge proofs, authentication, and so on) NC3. Network security [core] Minimum core coverage time: 3 hours Topics: √ Fundamentals of cryptography √ Secret-key algorithms √ Public-key algorithms Authentication protocols √ Digital signatures √ Examples √  Topic is covered in STS 497A March 4, 2004 ACM SIGCSE - Norfolk, VA

CC2001 – Cryptography Learning Objectives AL9. Cryptographic algorithms [elective] Learning objectives: √ Describe efficient basic number-theoretic algorithms, including greatest common divisor, multiplicative inverse mod n, and raising to powers mod n. √ Describe at least one public-key cryptosystem, including a necessary complexity-theoretic assumption for its security. NC3. Network security [core] Minimum core coverage time: 3 hours Learning objectives: √ Discuss the fundamental ideas of public-key cryptography. √ Describe how public-key cryptography works. √ Distinguish between the use of private- and public-key algorithms. Summarize common authentication protocols. √ Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message. √ Summarize the capabilities and limitations of the means of cryptography that are conveniently available to the general public. √  learning objective is addressed in STS 497A March 4, 2004 ACM SIGCSE - Norfolk, VA

PSU Center of Academic Excellence for Information Assurance Education http://net1.ist.psu.edu/cica/home.htm http://net1.ist.psu.edu/cica/ March 4, 2004 ACM SIGCSE - Norfolk, VA