CSE511 Cryptology and NW Security, (2010 spr)
Room:
E-mail: CSE466MU.MSakalli at gmail com
Office Hours: Friday: 2.00:3.00 pm.
Class Time: Thursdays, MB346, 2:30 – 5:30.
Evaluation: Students will be given projects.
The focus: Cryptology and web applications. At the end of the course you will
be able to build your proprietary security schemes particularly with a minimum
effort required.
Books: Internet is the best source.. but a list of the course books are as follows.
1* “Cryptography and Network Security (3rd Ed): William
Stallings, ISBN-10: 0130914290”, 4th edition
is also available but I’ll make the differences up with additional materials
along the way.
The
Handbook of Applied Cryptography of A. J. Menezes, P. C. van Oorschot
and S.A. Vanstone ISBN: 0-8493-8523-7, CRC press.
Notes of Dr
L. Brown at the
Tentative Syllabus |
|||||
Wk no |
2009-2nd Semester |
Activities (Subjects,
assignments, exams.) |
Lecture notes |
Log book |
Remarks |
1 |
18/Feb/09, 25/Feb/09,
11/Mar/09, |
Introductory materials for
cryptology and security, Shannon’s Perfect Security, Ciphers (Caesar,
Substitution, Transposition, Vigenère, Hill Cipher, etc.), |
Index of coincidence keylength
application, Mono
or Polyalphabetic decision chap2 of Lanaki’s notes, Extra notes From
ACA ciphers, |
||
4-6 |
02/Apr/09 09/Apr/09 Following week Exam
Midterm. Apr/14th/09 May/08/09 May/14/09 |
Modern Block Ciphers (DES,
AES), and attacks (differential cryptanalysis), |
4-6 Updated DES notes you are responsible from the
particular issues I emphasized, but your choice to delve inside if you would
like to. AES
Updated you must check. Reminding
a few corner- stones. Stream Ciphers, RC4, PRNG and some notes on
blockciphers of Blowfish, RC5. |
09/April, 7-AES
and overview of all the materials -Cache
attacks and countermeasures the case of AES -Timing Attacks on Cryptosystems provided fr
Prof. Cetin Koc’s lab. In Oregon
state. |
HW. Question
and cipher text. Due by 6/April/09. The answer of
hill cipher question will be released after midterm with your programs linked
here, if you provide command line information. |
7-10 |
May/29/09 |
Public Key Cryptography
(RSA) |
|
|
|
|
June, 5th, 09, btw 5pm to 7pm |
Subjects
emphasized such as primitive roosts, discrete logs, DH Key exchange and El
Gamal cryptography are updates within the slights of previous presentation. |
|
By using snmp port,
similar one, |
Network scanning tool, nmap code download, basic nmap usage video by
Adrian Crenshaw, Wep cracking, DNS spoofing,
kismac, nessus, replay without client, reset TCP, ssh tunneling, For your convenience, if you wish to download.
and \\ |
|
|
Advanced topics (Secret Sharing, Zero-Knowledge Proofs, Quantum Cryptography) |
|
Maximum Security (Hackers Guide) Analysis
Techniques for Detecting Coordinated Attacks and Probes |
|
|
June, 16th |
|
|
||
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
Cryptographic
Toolkit of CSRC NIST |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Google’s Browser security
handbook
|
Some More Reference Materials:
Dictionary of Algorithms and Data Structures
of NIST
Electronic Colloquium on Computational Complexity
Programming Texts and Tutorials from Tamu.edu
From pbs.org: Te mind of codebreaker, crack the ciphers, and send a coded message
Double Playfair cipher, double transposition cipher,
The end of ordinary money 1, II, by Orlin Grabbe
Brute force attack, answers com.
An fpga built codebreaker for DES,
Links from other
universities:
Prof Raij Jain,s Network Security
Cetin Koc Kaya
Oregon, Hardware Security and Cryptographic Engineering, Advanced Security and Crypt,
and ECE575,
Cryptology
and stenography collections.