Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Adrian Ilie COMP 14 Introduction to Programming Adrian Ilie Summer Session II, 2005 MTWRF 9:45-11:15 am.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #2 Aug 26 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
1 Foundations of Software Design Lecture 1: Course Overview Intro to Binary and Boolean Marti Hearst SIMS, University of California at Berkeley.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
COMP 14 Introduction to Programming Miguel A. Otaduy Summer Session I, 2004 MTWRF 9:45-11:15 am Sitterson Hall 014.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
University of Colorado - Dept of Aerospace Engineering Sciences - Introduction to FEM This is ASEN 5007: Introduction to Finite Element Methods.
ECS15: Introduction to Computers Fall 2013 Patrice Koehl
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
IS Fall 2009 Introduction and Chapter 1 8/17/2009.
Syllabus CS 765: Introduction to Database Management Systems Fall 2008 Text Database Management Systems Ramakrishnan/Gehrke, 3rd.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Authentication Question: how does a receiver know that remote communicating entity is who it is claimed to be?
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
1 Database Management for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. GSM 274/FEMBA 274 Spring 2002.
Database Design and Implementation ITCS6160 & ITCS 8160 Instructor: Jianping Fan Webpage:
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Introduction to Databases Computer Science 557 September 2007 Instructor: Joe Bockhorst University of Wisconsin - Milwaukee.
Chapter 1  Introduction 1 Chapter 1: Introduction.
CS 115 QUIZ # 1 INFORMATION Scheduled for TUESDAY 9/22/15 1.
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Fall 2o12 – August 27, CMPSC 202 First Day Handouts  Syllabus  Student Info  Fill out, include all classes and standard appointments  Return.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Lecture Section 001 Spring 2008 Mike O’Dell CSE 1301 Computer Literacy.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
1 Technologies for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. FEMBA 290 Winter 2003.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Chapter 3 Encryption Algorithms & Systems (Part D)
Introduction to Information Security J. H. Wang Sep. 18, 2012.
1 Introduction to Data Communication Networks ISQS 3349, Spring 2001 Instructor: Zhangxi Lin Office: BA 708 Phone: Homepage:
MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office New Building
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Network Economics -- Introduction and rules Patrick Loiseau EURECOM Fall 2012.
DES: Data Encryption Standard
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Introduction to CSCI 1311 Dr. Mark C. Lewis
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Foundations of Network and Computer Security
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
PowerPoint® Slides to Accompany
Introduction to the course
Foundations of Network and Computer Security
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007

Introduction UC Davis –PhD in 2000 –Cryptography –Interested in broader security as well UNR two years CU Boulder five years –(Going up for tenure… yikes!) My teaching style and personality

This Class Use above for all materials –Available from my home page This is a CAETE course –Several distance-learning students –Lectures available on the web (later) –Lectures on VHS in library in Math bldg

Logistics MWF, ECCS 1B12, 10am – 10:50am Final, Tuesday Dec. 18 th, 7:30am – 10am Office Hours –ECOT 627, W 11-11:50am; R 9:30-10:20am –More as needed (better than dropping by without an appt)

Grading See course info sheet –Let’s go over it nowit Course Topics –Why no book? –Cryptography and Network Security Quite a blend of math, hacking, and thinking

Topics Policy, Law, History –A Taste Today Cryptography –Not how to make it, but how to use it Hacking –Buffer overruns, WEP attack, TCP session hijacking, DDoS, prevention –Some hands-on using OpenSSL (project)

Miscellany Class Format: Informal –Small class –Ask questions! Slides –Sometimes available in advance Schedule –Usually up-to-date and onlineonline

History Early days of Cryptography Lucifer and DES Export restrictions –40 bit keys! Public Key Cryptography –MI6 had it first?! Differential cryptanalysis –NSA knew first

Who is the NSA? National Security Agency –Huge –Fort Meade, MD –More mathematicians than anywhere –Classified budget

Laws DMCA –Felten RIAA/SDMI case most famous 2001 SDMI challenge –Many believe it’s the right idea, but a bad law –All reverse-engineering is sketchy CALEA (1994) –Communications Assistance for Law Enforcement Act –Recently ruling says VoIP must provide compliance Still in the courts Patriot Act

Case Study Accountant for crime ring –Used PGP Pretty Good Privacy Phil Zimmerman –Feds seized computer Couldn’t read files! –Subpoena for keylogger –Worked like a charm!

Policy Government has attempted to control encryption before –Skipjack –Key Escrow –Clipper Chip Ultimately failed due to massive protest from “privacy advocates” –Electronic Frontier Foundation (John Gilmore)