Download presentation
Presentation is loading. Please wait.
Published byElijah Jefferson Modified over 6 years ago
1
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Course Overview and Organization Introduction to Network Security Dr. Attila Altay Yavuz Spring 2018
2
High-Level Objectives
Cryptographic primitives and Net. Sec. foundations: Essential cryptographic building blocks Their properties and use Basic Service: Authentication and Handshakes Primitives Protocols Key Management and Establishment Protocols Network Security Protocols Selected Advanced Topics
3
Pre-reqs and Grading Required:
Good C/C++ programming CS 372 and CS 321 Desirable but not required: Previous security courses CS 370 or CS 427 Grading: No mid-term or final! 5 Homeworks (10% each): 50% total HWs are research-oriented (10 days each) 3-4 Mini-projects in form of labs: 50% total You will have access to remote Virtual Machines (VMs) to work Implementation of network security protocols with crypto libraries Around 2-weeks duration each Extra credit quizzes (e.g., 7-8%)
4
Topics – Syllabi Outline – TENTATIVE TIMING
Week 1-2: Hash-based primitives and Net. Sec. Tools Week 3-4: Preparation for Network Security Protocols Symmetric Primitives: DES and AES (not covered in CS 427) Key Exchange: DH and Certificates (quick recap with some number theory) Encryption/Authentication: Elgamal, Schnorr, DSA, (not covered in CS 427) Week 4-5-6: Net. Sec. Protocols Handshake principles, replay attacks, etc.. Needham-Schroeder, Otway-Rees, Kerberos, Station-to-Station protocol, common mistakes Week 6-7: Net. Sec. Protocols SSL/TLS IPSec, Basic Cloud Security Week 7-8: Key Management and Establishment: IoT Key Distribution Group Key Establishment: GDH protocols Group Key Management: Iolus, Logical Key Hierarchy, Key Trees Week 9: Privacy in Cloud and Emerging Wireless Systems Searchable Encryption for Cloud Storage: Privacy versus data utilization dilemma Location-Privacy in Cognitive Radio Networks Week 10: Selected Topics in Emerging Network Security
5
Pre-reqs and Grading Homeworks (5 HWs, each has generally 5-6 questions): Some asks you to dig deeper in topics covered in class Some complements topics not covered in class: Research-based questions Some involve a proof or algorithm analysis Mini-projects (3-4 lab assignments) ZeroMQ network package to connect processes, remote access for implementation MIRACL cryptographic library for protocol implementation Counter Denial of Service Tool Implement a client-server puzzle with client-server model Authentication at Post-Quantum Era Implement a simple multiple-time hash based signature A Secure Digital Forensic Tool: Loss/Compromise Resilient Logger Implement forward-secure and aggregate authentication for logs Compression and information dispersal for network resiliency Implement your mini TLS Implement an authenticated TLS handshake with certificates and ECC Crypto
6
Logistics and Notes Instructor Office Hours and Course Webpage:
Tuesday 2:00 – 4:00 PM (to be updated), KEC 3065 Class (important!) and in-class announcement Your TA and Office Hours: Mr. Rouzbeh Behnia, John 125 Monday and Wednesday, 12:00 – 1:30 PMs (extra grading hours will be hold). Grading and assignment related questions go to TA, everything else is me. A protocol and cryptography oriented approach to network security This is not a system security course! No hacking, etc… Plenty of protocols, coding and cryptography! Instructor Travels 2 weeks of travel (out of state and out of US) 1 week will be covered by guest faculty 1 week will be covered by TA
7
Extra Resources (not required but optional)
No textbook is required. Lecture slides and reading papers will be provided at course website. However, some optional books that may be useful: Charlie Kaufman, Radia Perlman, and Mike Speciner, “Network Security: Private Communication in a Public World”, Second Edition, Prentice Hall. (some slides and assignments are from this book) Douglas R. Stinson, “Cryptography Theory and Practice, 3rd edition". Jonathan Katz & Yehuda Lindell , “Introduction to Modern Cryptography”. Free online cryptography resources: Lecture notes of Dr. Mihir Bellare: "The Joy Cryptography" from Dr. Mike Rosulek:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.