COE 551
Information & Network Security 

CATALOG DESCRIPTION

  • Principles and practice of network and internetwork security.

  • Mathematical principles of cryptography and data security.

  • Conventional and modern crypto systems. Secure communication protocols.

  • Authentication and Digital Signatures.

  • Secure IP and SSL.

  • Modern applications like digital cash and secure distributed computing.

  • Operational aspects of computer and network security.

Course Objectives

Information security and cryptography provides the gateways through which electronic commerce will flow in the future Internet. Most technologies that shape tomorrow's society will be built around these gateways. These gateways will allow mass customization of information to individual and corporate consumers by letting people turn their driver's licenses into digital wallets that carry anything from electronic cash to credit lines, airline tickets, or medical prescriptions.

Information security technology provides the necessary tools and methods for the construction of this infrastructure in such a way that the privacy, ownership rights, and consumer rights of the participants are protected. We will study theoretical aspects of cryptographic algorithms and security protocols, and show how these techniques can be applied to solve particular data storage, networking, communication security, rights management problems.

Learning outcome

  • The theoretical aspects of cryptographic algorithms and protocols.

  • How theoretical crypto techniques can be integrated to solve particular information security problems.

  • The theoretical aspects providing integrity, confidentiality, and authenticity of documents and communicating parties.

  • Model, simulate, synthesize, and analyze information security systems. 

Selected References

  • Security in Computing, Pfleeger, C. and Pfleeger, S. (2003), 3rd Edition, Prentice Hall 

  • Hacking Exposed, S. McClure and George Kurtz,  5th Edition, McGraw Hill

  • Data Communications and Networking, 3/e. Behrouz A Forouzan, McGraw-Hill 2004

Grading Policy                     

Homework & Assignments

20%

Term paper

30%

Quizzes & Attendance & Classwork

Bonus

Exam I 

15%

Exam II

15%

Final

20%

                                                                    

Plagiarism, copying and other anti-intellectual behavior are prohibited by the university regulations. Violators may have to face serious consequences. 

Topics

Week

1

Introduction

2

Online Attacks

Malware

Social engineering

3

Physical Security

Communication security   - buffer overflow 

brute force password gussing  - Cryptanalysis 

Access Control

4

Stegnography

Hashing

Students Presentations (proposal)

5

EXAM I

Cryptography (Classical Cipher)

Cryptography (mathematical cipher)

6

Cryptography (Stream cipher,  RC4)

Cryptography (Block cipher cipher)

7

Cryptography (Block cipher cipher, DES)

Cryptography (AES)

8

Cryptography (public key)

Cryptography (RSA)

9

Secret Sharing

10

EXAM II

Students Presentations (half way)

11

Software reverse engineering

Program Security

12

Firewalls

IP sec

13

Policy

Policy 2

Risk Management

14

Selected topics

15

Students Presentations (final)

F

Final Examinations

F