COSC5345Computer Network Security

Spring 2010

Instructor:

Dr. Bo Sun

Office: Maes 70

Telephone: 409-880-8781

Email:

Class Hours:

TR 2:00pm – 3:15pm Room: Maes 111

Office Hours:

T: 12:00pm - 2:00pm, W: 10:00am – 12:00pm, and by appointment

Course Description and Objectives:

The objective of this course is to provide students with fundamental concepts and principles in the areas of computer and network security, including public and private key cryptographic algorithms and their applications, authentication protocols, hash functions, network access control mechanisms,network attack techniques and methods to defend against them, characteristics of typical security architectures and protocols.

Learning Outcomes:

By the end of the course, students will be able to:

  • Master basic security concepts – encryption, decryption, attacks, security objectives, and security standards.
  • Master the basic number theory required for cryptographic applications/systems
  • Master key management system - key distribution center, certification authority.
  • Master secret Key Cryptography – DES/IDEA/AES, mode of operation, ECB, CBC, k-bit OFB, k-bit CFB, CTR.
  • Master public Key Cryptograph – RSA, Diffie-Hellman, DSS.
  • Master hashes and Message Digests – Birthday problem, MD5, SHA-1, HMAC
  • Master authentication Systems/Protocols – password based authentication, trusted intermediaries, key distribution center, certification authority, Lamport’s hash, and small n attack.
  • Master security Standards – Kerberos, Public Key Infrastructure, IPSec
  • Master email Security, Pretty Good Privacy, Web Security Issues
  • Master firewalls

Prerequisites:

Basic concepts of Discrete Mathematics, CPSC3320, Data Structures. (You do not need to have a comprehensive knowledge of them)

Required Textbooks:

Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security - Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002. ISBN 0-13-046019-2.

References:

William Stallings, Cryptography and Network Security: Principles and Practice; Third Edition, Prentice Hall, Hardcover, ISBN 0-13-091429-0

Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996, ISBN 0-471-12845-7

Class Website:

This website contains the latest information about the class. Please do check this page frequently.

Grading Policies

Grades will be based on the following:

Attendance5%

Homework:10%

Project:10%

Midterm:30%

Final:45%

No makeup exam will be given due to personal reasons.

Student with Disabilities

This course complies with university policies on disabilities. Please see the Student Handbook for more details.

Academic Honesty:

Scholastic dishonesty will not be tolerated. We encourage discussion of homework and class projects. However, the final product submitted for the grade must be the individual work of the person turning it in. If codes from two or more students are essentially identical, the assignments may be rejected with no credit for any of the students involved. Cheating and plagiarism in tests and quizzes will receive the same penalty.

Late policy

All assignments must be turned in at the beginning of the class on the due date specified. Late assignments will be penalized 10% per day and will be accepted within maximum 2 days after the due date. Assignments that are more than 2 days late will not be accepted. All assignments should be typed. Handwritten assignments will not be accepted.