Presentation is loading. Please wait.

Presentation is loading. Please wait.

Foundations of Network and Computer Security

Similar presentations


Presentation on theme: "Foundations of Network and Computer Security"— Presentation transcript:

1 Foundations of Network and Computer Security
John Black CSCI 6268/TLEN 5550, Spring 2013

2 Introduction UC Davis UNR two years CU Boulder seven years
PhD in 2000 Cryptography Interested in broader security as well UNR two years CU Boulder seven years My teaching style and personality

3 This Class Use above for all materials This is a CAETE course
Use above for all materials Available from my home page This is a CAETE course Several distance-learning students Lectures available on the web (later)

4 Logistics MWF, ECCS 1B28, 2pm – 2:50pm
Final, Tuesday May 6th, 7:30pm – 10pm Office Hours ECOT 627, M 11-11:50am; F 1:00-1:50pm (better than dropping by without an appt)

5 Grading See course info sheet Course Topics
Grading: 4-5 quizzes (20%), a project (20%), a midterm (25%) and a final (35%) Course Topics Why no book? Cryptography and Network Security Quite a blend of math, hacking, and thinking

6 Topics Policy, Law, History Cryptography Hacking A Taste Today
Not how to make it, but how to use it Hacking Buffer overruns, WEP attack, TCP session hijacking, DDoS, prevention Some hands-on using OpenSSL (project)

7 Miscellany Class Format: Informal Slides Schedule Small class
Ask questions! Slides Sometimes available in advance Schedule Usually up-to-date and online

8 History Early days of Cryptography Lucifer and DES Export restrictions
40 bit keys! Public Key Cryptography MI6 had it first?! Differential cryptanalysis NSA knew first

9 Who is the NSA? National Security Agency Huge Fort Meade, MD
More mathematicians than anywhere else Classified budget

10 Does the US Spy on its Citizens?
Yes.

11 Laws DMCA CALEA (1994) Patriot Act Felten RIAA/SDMI case most famous
2001 SDMI challenge Many believe it’s the right idea, but a bad law All reverse-engineering is sketchy CALEA (1994) Communications Assistance for Law Enforcement Act 2004 ruling says VoIP must provide compliance Has withstood all court challenges Patriot Act

12 Policy Government has attempted to control encryption before
Skipjack Key Escrow Clipper Chip Ultimately failed due to massive protest from “privacy advocates” Electronic Frontier Foundation (John Gilmore)


Download ppt "Foundations of Network and Computer Security"

Similar presentations


Ads by Google