Cryptography and Computer Security for Undergraduates Paul De Palma Gonzaga University Gonzaga University Charles Frank Northern Kentucky University Northern.

Slides:



Advertisements
Similar presentations
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
Advertisements

Best Practices in Teaching Systems Engineering to Undergraduates 1 The Systems Engineering University Affiliated Research Center 1st.
1 Undergraduate Curriculum Revision Department of Computer Science February 10, 2010.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Cyber Education Project Accreditation Committee November 2014.
Department of Mathematics and Computer Science
Information Security Teaching, training, research.
1 Exploring NSF Funding Opportunities in DUE Tim Fossum Division of Undergraduate Education Vermont EPSCoR NSF Research Day May 6, 2008.
Revised MS Program in Computer Science INFORMATION AND COMPUTER SCIENCE DEPARTMENT October 2002.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Overview CSE 465 Information Assurance
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Erin E. Corman National Security Agency Mathematics Hiring Manager
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Structure of Study Programmes
Information Security and Computer Systems: An Integrated Approach Mark A. Holliday and Bill Kreahling, Dept of Mathematics and Computer Science Western.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Midterm Review Cryptography & Network Security
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography and Network Security (CS435) Part Eight (Key Management)
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
The Data Encryption Standard (DES) By Danny Gibbs 4/19/2005.
{ Applying the NSF/TCPP Curriculum Recommendations to a Liberal Arts Curriculum Akshaye Dhawan, Ursinus College.
Computer Science 210 Computer Organization Course Introduction.
Center for Cybersecurity Research and Education (CCRE)
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Revised MS Program in Computer Science INFORMATION AND COMPUTER SCIENCE DEPARTMENT December 2002.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
New Computer Science Programme at the Department of Informatics Pedro Guerreiro University of Nis, March 24, 2006.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CS 1010– Introduction to Computer Science Daniel Tauritz, Ph.D. Associate Professor of Computer Science Director, Natural Computation Laboratory Academic.
Industry Advisory Board
Web Applications Security Cryptography 1
BEng(CompSc) Curriculum Structure & Highlights
Chuck Frank Northern Kentucky University
Computer Science Courses
CS 1010– Introduction to Computer Science
Information Security at Florida State University
Information Security at Florida State University
Efficient CRT-Based RSA Cryptosystems
ACM/IEEE-CS Computer Science Curriculum
Cryptography and Computer Security for Undergraduates
Information Security at Florida State University
Security in Network Communications
Chuck Frank Northern Kentucky University
Information Security at Florida State University
Security Analysis of Network Protocols
Introduction to Information Assurance
Computer Science Courses in the Major
Presentation transcript:

Cryptography and Computer Security for Undergraduates Paul De Palma Gonzaga University Gonzaga University Charles Frank Northern Kentucky University Northern Kentucky University Suzanne Gladfelter Penn State York Joshua Holden Rose-Hulman Institute of Technology

Inspiration “We stand today on the brink of a revolution in cryptography” “We stand today on the brink of a revolution in cryptography” Diffie & Hellman, 1976 Diffie & Hellman, 1976 “If all the personal computers in the world…were put to work on a single PGP-encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message.” “If all the personal computers in the world…were put to work on a single PGP-encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message.” William Crowell, Deputy Directory of the NSA, 1997 William Crowell, Deputy Directory of the NSA, 1997

Then Why Are Systems Vulnerable? Shortage of security personnel Shortage of security personnel From the NSA Website: From the NSA Website: “The National Plan for Information Systems Protection … highlights the acute shortage in the subset of trained information systems security personnel.” Cryptographic algorithms are embedded in real systems of staggering complexity. Cryptographic algorithms are embedded in real systems of staggering complexity.

The Federal Government’s Response NSA has established Centers of Academic Excellence in Information Assurance Education NSA has established Centers of Academic Excellence in Information Assurance Education Students in universities so designated are eligible for scholarships Students in universities so designated are eligible for scholarships The Cyber Security Research and Development Act (2002) provides $216 million to support training in computer security The Cyber Security Research and Development Act (2002) provides $216 million to support training in computer security

Computing Curricula 2001’s Response: The Context “Computing is a broad field that extends well beyond the boundaries of computer science” “Computing is a broad field that extends well beyond the boundaries of computer science” CC 2001 CC 2001 Chomsky once observed that the maturity of a discipline is inversely proportional to its size. Chomsky once observed that the maturity of a discipline is inversely proportional to its size. “I was so much older then, I’m younger than that now.” “I was so much older then, I’m younger than that now.”

NC3: Network Security (core component, Net-Centric Computing) NC3: Network Security (core component, Net-Centric Computing) OS7: Security and protection (elective component, Operating Systems) OS7: Security and protection (elective component, Operating Systems) AL9: Cryptographic algorithms (elective component, Algorithms and AL9: Cryptographic algorithms (elective component, Algorithms andComplexity) CS312: Cryptography (an advanced course, Algorithms and Complexity) CS312: Cryptography (an advanced course, Algorithms and Complexity) Security and Cryptographic Issues Appear Four Times in CC2001

CS312 Cryptography Topics Historical overview of cryptography Historical overview of cryptography Private-key cryptography and the key-exchange problem Private-key cryptography and the key-exchange problem Public-key cryptography Public-key cryptography Digital signatures Digital signatures Security protocols Security protocols Applications (zero-knowledge proofs, authentication, and so on) Applications (zero-knowledge proofs, authentication, and so on)

Initial Problems CS students have not studied number theory CS students have not studied number theory Mathematics students have not studied CS Mathematics students have not studied CS Turf battles between departments of mathematics and computer science Turf battles between departments of mathematics and computer science

More Significantly Cryptography without a significant consideration of complex systems is misleading Cryptography without a significant consideration of complex systems is misleading Most texts present crypto as if it were applied mathematics Most texts present crypto as if it were applied mathematics Crypto has a lively social context Crypto has a lively social context Battles over exporting strong crypto Battles over exporting strong crypto The Clipper Chip The Clipper Chip

In Sum Crypto is necessary for the CS curriculum Crypto is necessary for the CS curriculum Crypto will be hard for many CS majors Crypto will be hard for many CS majors Crypto enters an already crowded curriculum Crypto enters an already crowded curriculum Crypto must be placed in a systems context Crypto must be placed in a systems context Crypto materials: Crypto materials: