Office:Bryan 523
Office Hours: | Mondays: 11:00AM-12:00PM |
Wednesdays: 11:00AM-12:00PM |
Teaching Assistant: Mart Haitjema, Bryan 422, Email: mah5@cec.wustl.edu, Office Hours: Friday 3:00-4:00PM
All question about the labs, homeworks and mid-term exams 1 and 2 grading should be directed to the teaching assistant.
Course Description:
A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private networks, authentication, authorization, accounting (AAA), WiFi security, Domain Name System security (DNSSEC), intrusion detection systems.
Prerequisites:CSE 473S (Introduction to Computer Networking) or equivalent.
Credits:3 Units.
Time:Monday-Wednesday 1:00PM-2:30PM
Textbook: William Stallings, "Cryptography and Network Security: Principles and Practice," 5th Edition, Prentice Hall, 2011, ISBN:0-13-609704-9. Please get the latest edition. Do not use older editions. If you use international edition, it should be dated 2011. It should have last page number 719. ISBN: 978-0-13-609704-9, or 0-13-609704-9
Audio/Video recordings of lectures from the last offering of this course are available on-line.
Tentative Schedule:
# | Day | Date | Topic | Chapter |
1 | Wednesday | 08/31/2011 | Course Intro | |
2 | Monday | 09/05/2011 | Holiday - Labor Day | |
3 | Wednesday | 09/07/2011 | Security Overview | 1 |
Classical Encryption Techniques | 2 | |||
4 | Monday | 09/12/2011 | Block Ciphers and DES | 3 |
5 | Wednesday | 09/14/2011 | Basic Concepts in Number Theory and Finite Fields | 4 |
6 | Monday | 09/19/2011 | Advanced Encryption Standard (AES) | 5 |
Block Cipher Operations (Part 1) | 6 | |||
7 | Wednesday | 09/21/2011 | Block Cipher Operations (Part 2) | 6 |
Pseudo Random Number Generation and Stream Ciphers | 7 | |||
Number Theory (Part 1) | 8 | |||
8 | Monday | 09/26/2011 | Number Theory (Part 2) | 8 |
Public Key Cryptography (Part 1) | 9 | |||
9 | Wednesday | 09/28/2011 | Public Key Cryptography (Part 2) | 9 |
Other Public Key Cryptosystems (Part 1) | 10 | |||
10 | Monday | 10/03/2011 | Exam 1 | |
11 | Wednesday | 10/05/2011 | Exam 1 Review | |
Other Public Key Cryptosystems (Part 2) | 10 | |||
12 | Monday | 10/10/2011 | Cryptographic Hash Functions | 11 |
Project Guidelines (Part 1) | ||||
13 | Wednesday | 10/12/2011 | Message Authentication Codes | 12 |
Digital Signatures (Part 1) | 13 | |||
14 | Monday | 10/17/2011 | Digital Signatures (Part 2) | 13 |
Key Management and Distribution (Part 1) | 14 | |||
15 | Wednesday | 10/19/2011 | Key Management and Distribution (Part 2) | 14 |
User Authentication Protocols (Part 1) | 15 | |||
16 | Monday | 10/24/2011 | User Authentication Protocols (Part 2) | 15 |
Project Guidelines (Part 2) | ||||
17 | Wednesday | 10/26/2011 | Transport Level Security (Part 1) | 16 |
18 | Monday | 10/31/2011 | Transport Level Security (Part 2) | 16 |
Authentication, Authorization, Accounting (AAA) | ||||
19 | Wednesday | 11/02/2011 | Wireless Network Security (Part 1) | 17 |
20 | Monday | 11/07/2011 | Exam 2 | |
21 | Wednesday | 11/09/2011 | Exam 2 Review | |
Wireless Network Security (Part 2) | 17 | |||
22 | Monday | 11/14/2011 | Project Guidelines (Part 3) | |
Paper Review Form (right click and save link/target as) | ||||
23 | Wednesday | 11/16/2011 | Wireless Network Security (Part 3) | 17 |
24 | Monday | 11/21/2011 | Electronic Mail Security | 18 |
25 | Wednesday | 11/23/2011 | Holiday - Thanks Giving | |
26 | Monday | 11/28/2011 | IP Security | 19 |
27 | Wednesday | 11/30/2011 | Intrusion Detection | 20 |
28 | Monday | 12/05/2011 | No Class | |
29 | Wednesday | 12/07/2011 | Final Exam |
Grading:
Exams: 60%
Homeworks: 15%
Project: 20%
Class participation: 5%
Students Hands-on Projects:
Student Survey Papers: