COE 449---T071
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Catalog Description Course Description v Principles and practice of network and internetwork security. v Mathematical principles of cryptography and data security. v Conventional and modern crypto systems. v Secure communication protocols. v Authentication and Digital Signatures. v Secure IP and SSL. v Modern applications like digital cash and secure distributed computing. v Operational aspects of computer and network security. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Course ObjectivesInformation security and cryptography provides the gateways through which electronic commerce will flow in the future Internet. Most technologies that shape tomorrow's society will be built around these gateways. These gateways will allow mass customization of information to individual and corporate consumers by letting people turn their driver's licenses into digital wallets that carry anything from electronic cash to credit lines, airline tickets, or medical prescriptions. Information security technology provides the necessary tools and methods for the construction of this infrastructure in such a way that the privacy, ownership rights, and consumer rights of the participants are protected. We will study theoretical aspects of cryptographic algorithms and security protocols, and show how these techniques can be applied to solve particular data storage, networking, communication security, rights management problems. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning outcome The student is expected to be knowledgeable of: v The theoretical aspects of cryptographic algorithms and protocols. v How theoretical crypto techniques can be integrated to solve particular information security problems. v The theoretical aspects providing integrity, confidentiality, and authenticity of documents and communicating parties. v Model, simulate, synthesize, and analyze information security systems. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Selected References
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Grading Policy
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Plagiarism, copying and other anti-intellectual behavior are prohibited by the university regulations. Violators may have to face serious consequences. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||
Topics | |||||||||||||||||||||||||||||||||||||||||||||||||||||
|