CSE466 Introduction to Cryptology and NW Security, (2009
spr)
Room:
E-mail: CSE466MU.MSakalli at gmail com
Office Hours: Friday: 2.00:3.00 pm.
Class, Time: MB346, 2:30 – 5:30.
Evaluation: %40 Exam + %20 * 1 Mid term + 2*%20 Final Project.
The focus: Cryptology and its web applications. At the end of the course you
will be able to build your proprietary security schemes particularly with a
minimum effort required.
Books: Most of the
materials will be addressed from internet sources.
A preliminary list of the books: The primary course book
I will follow is “Cryptography and Network Security (3rd Ed): William
Stallings, ISBN-10: 0130914290”, 4th edition
is also available but I’ll make the differences up with additional materials
along the way.
Among many well known
sources with online chapters:
The
Handbook of Applied Cryptography of A. J. Menezes, P. C. van Oorschot and
S.A. Vanstone ISBN: 0-8493-8523-7, CRC press.
Notes of Dr
L. Brown at the
Online books may be
available through library, which is what I am going to check..
Note: Please keep in mind
that all materials and links provided here will frequently be updated.
Tentative Syllabus |
|||||
Wk no |
2009-2nd Semester |
Activities (Subjects,
assignments, exams.) |
Lecture notes |
Log book |
Remarks |
1 |
19/Feb/09, 25/Feb/09, 12/Mar/09, |
Introductory materials for
cryptology and security, Shannon’s Perfect Security, Ciphers (Caesar,
Substitution, Transposition, Vigenère, Hill Cipher, etc.), |
Playfair cipher, “Have His Carcase”.. |
Index of coincidence keylength
application, Mono
or Polyalphabetic decision chap2 of Lanaki’s notes, Extra notes From
ACA ciphers, |
|
4-6 |
19/Mar/09, 26/Mar/09 02/Apr/09 09/Apr/09 Following week Exam
Midterm. Apr/14th/09 May/08/09 May/14/09 |
Modern Block Ciphers (DES,
AES), and attacks (differential cryptanalysis), |
4-6 Updated DES notes you are responsible from the
particular issues I emphasized, but your choice to delve inside if you would
like to. AES
Updated you must check. Reminding
a few corner- stones. Stream Ciphers, RC4, PRNG and some notes on
blockciphers of Blowfish, RC5. |
09/April, 7-AES
and overview of all the materials -Cache
attacks and countermeasures the case of AES -Timing Attacks on Cryptosystems provided fr
Prof. Cetin Koc’s lab. In Oregon
state. |
HW. Question
and cipher text. Due by 6/April/09. The answer of
hill cipher question will be released after midterm with your programs linked
here, if you provide command line information. Midterm
Answers.. prg you need |
7-10 |
May/29/09 |
Public Key Cryptography
(RSA) |
|
|
|
|
June, 5th, 09, btw 5pm to 7pm |
Subjects
emphasized such as primitive roosts, discrete logs, DH Key exchange and El
Gamal cryptography are updates within the slights of previous presentation. |
|
By using snmp port,
similar one, |
Network scanning tool, nmap code download, basic nmap usage video by
Adrian Crenshaw, Wep cracking, DNS spoofing,
kismac, nessus, replay without client, reset TCP, ssh tunneling, For your convenience, if you wish to download.
and \\ |
|
|
Advanced topics (Secret Sharing, Zero-Knowledge Proofs, Quantum Cryptography) |
|
Maximum Security (Hackers Guide) Analysis
Techniques for Detecting Coordinated Attacks and Probes |
|
|
June, 16th |
|
|
||
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
Cryptographic
Toolkit of CSRC NIST |
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
Some More Reference Materials:
Dictionary of Algorithms and Data Structures
of NIST
Electronic Colloquium on Computational Complexity
Programming Texts and Tutorials from Tamu.edu
From pbs.org: Te mind of codebreaker, crack the ciphers, and send a coded message
Double Playfair cipher, double transposition cipher,
The end of ordinary money 1, II, by Orlin Grabbe
Brute force attack, answers com.
An fpga built codebreaker for DES,
Links from other
universities:
Prof Raij Jain,s Network Security
Cetin Koc Kaya
Oregon, Hardware Security and Cryptographic Engineering, Advanced Security and Crypt,
and ECE575,
Cryptology
and stenography collections.