↑ Return to Teaching

Cryptography and Network Security (Spring 2013)

Description


We cover in this course principles and practice of cryptography and network security: classical systems, symmetric block ciphers (DES, AES, other contemporary symmetric ciphers), linear and differential cryptanalysis, perfect secrecy, public-key cryptography  (RSA, discrete logarithms), algorithms for factoring and discrete logarithms, cryptographic protocols, hash functions, authentication, key management, key exchange, signature schemes, email and web security, viruses, firewalls, and other topics.

 

Breaking News


Content


  1. CONVENTIONAL ENCRYPTION
    • Classical Systems
    • Conventional Encryption: DES, AES
    • Contemporary Symmetric Ciphers: 3DES, RC4, RC5
  1. PUBLIC-KEY ENCRYPTION
    • Introduction to Number Theory
    • Public-Key Cryptography. RSA
    • Key Management
    • Message Authentication and Hash Functions
    • Hash and Mac Algorithms
    • Digital Signatures and Authentication Protocols
  1. AUTHENTICATION
    • MAC
    • Hash and message digests
    • Digital signatures
    • Passwords
    • Kerberos
  1. NETWORK SECURITY
    • Authentication Applications
    • Electronic Mail Security
    • IP Security
    • Web Security
  1. OTHER ISSUES
    • Intruders and Viruses
    • Firewalls
    • Digital cash
    • Secret sharing schemes
    • Zero-knowledge techniques
    • Folklore

 

Literature


  • Text book: Stallings, W., Cryptography and Network Security. Principles and Practice, 5th edition, Prentice Hall, 2011.
  • Other sources, including: Network Security. Private communication in a public worls, Prentice Hall, 2002.
  • Trappe, W., Washingotn, L.C., Introduction to Cryptography with coding theory, Pearson-Prentice Hall, 2006.
  • Tanenbaum, A.S., Computer Networks, 4th edition, Prentice Hall, 2003.
  • Stinson, D., Cryptography. Theory and Practice, 2nd edition, CRC Press, 2002.
  • Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1997.
  • Salomaa, A., Public-Key Cryptography, 2nd edition, Springer-Verlag, 1996.
  • Papadimitriou, C., Computational Complexity, Addison-Wesley, 1995.
  • Koblitz, N., A Course in Number Theory and Cryptography, 2nd edition, Springer 1994.
  • Bach, E., Shallit, J., Algorithmic Number Theory, Vol. I: Efficient Algorithms, 2nd printing, MIT Press, 1997.

 

Online resources


 

Credits


5 sp

 

Components


28h lectures, optional projects, final exam.

 

Time and place


The course starts on March 11, 10:15 AM, aud. Fortran (A3058) ICT-house and ends by the end of April

The lectures are given every week on:

  • Mondays 10-12 aud. Fortran (A3058), ICT-house
  • Thursdays 13-15 aud. Gamma, ICT-house

Exam dates:

  • 24.5.2013
  • 07.06.2013

 

Prerequisites


The courses on “Programmering (grundkurs)”, “Programmering (fortsättningskurs)”, “Praktikum i programmering”, “Datastrukturer”, “Algoritmer”. Familiarity with computers, Internet, email, computer viruses and average-level mathematics. Advanced mathematics (including elements of number theory and finite fields) will be introduced throughout the course whenever needed.

 

Registration (also for the exam)


Through MinPlan.

 

Lecturer


Dr. Vladimir Rogojin (vrogojin at abo.fi, room B5078, ICT-house)

Department of IT, Åbo Akademi University.

 

Lecture slides and recommended reading

  • W. Stallings – Stallings, W., Cryptography and Network Security. Principles and Practice, 5th edition, Prentice Hall, 2010
  • W. Stallings, L. Brown,  Computer Security. Principles and Practice, 2nd edition, Pearson Education Ltd., 2012
  • Ch. Kaufman, R. Perlman, R. Speciner, Network Security. Private communication in a public worls, Prentice Hall, 2002.

 


  1. Introduction – March 11, 2013
  2. Classical encryption – March 14, 2013
    1. W. Stallings, Chapter 2: Classical Encryption Techniques
  3. Block ciphers and DES – March 18, 2013
    1. W. Stallings, Chapter 3: Block Ciphers and the Data Encryption Standard
  4. Block cipher operation, RC5, RC4 – March 21, 2013
    1. W. Stallings,
      1. Chapter 6: Block Cipher Operation;
      2. Chapter 7, Section 7.5: RC4
  5. Basic notions of finite fields – March 25, 2013
    1. W. Stallings, Chapter 4: Basic Concepts in Number Theory and Finite Fields
  6. Advanced Encryption Standard (AES) – March 28, 2013
    1. W. Stallings, Chapter 5: Advanced Encryption Standard
  7. Public-key cryptography and RSA – April 4, 2013
    1. W. Stallings, Chapter 9: Public-Key Cryptography and RSA
  8. Protocols for public-key management – April 8, 2013
    1. W. Stallings, Chapter 14
      1. Section 14.3: Distribution of Public Keys;
      2. Section 14.4: X.509 Certificates;
      3. Section 14.5: Public-Key Infrastructure
  9. Authentication protocols, digital signatures – April 11, 2013
    1. W. Stallings, Chapter 15: User Authentication
    2. Diffie-Hellman Key Exchange, Khan Academy, Brit Cruise
  10. Message authentication: MAC, hashes – April 15, 2013
    1. W. Stallings, Chapter 12: Message Authentication Codes
  11. Message authentication: MD5, SHA-1, HMAC – April 18, 2013
    1. W. Stallings, Chapter 11: Cryptographic Hash Functions;
    2. W. Stallings, L. Brown,
      1. Section 21.1: Secure Hash Functions;
      2. Section 21.2: HMAC;
    3. Ch. Kaufman, R. Perlman, R. Speciner
      1. Section 5.5: MD5;
      2. Section 5.6: SHA-1;
      3. Section 5.7: HMAC
  12. Email security: PGP and S/MIME – April 22, 2013
    1. W. Stallings, Chapter 18: Electronic Mail Security
  13. Web security, IP security, Firewalls – April 25, 2013
    1. W. Stallings
      1. Chapter 16: Transport-Level Security;
      2. Chapter 19: IP Security;
    2. Ch. Kaufman, R. Perlman, R. Speciner, Chapter 23: Firewalls
  14. Wireless security, Password management, Viruses – April 29, 2013
    1. W. Stallings, Chapter 17: Wireless Network Security;
    2. W. Stallings, L. Brown
      1. Chapter 8: Intrusion Detection;
      2. Chapter 6: Malicious Software

 

Asignments


Ask me for password

2012 aj lee online free wordpress