70 likes | 84 Views
This course introduces computer and network security concepts, including confidentiality, integrity, and availability. It covers design decisions for constructing secure systems and presents cryptography concepts. Topics include classical encryption techniques, symmetric and public-key cryptography, message authentication, digital signatures, and various security applications.
E N D
DEPARTMENT of INFORMATION TECHNOLOGIES INTERNATIONAL BURCH UNIVERSITY CEN 621 Cryptography and Network Security 2011-2012Spring Term Dr. Abdülhamit Subaşıasubasi@ibu.edu.ba
Class Schedule: Tuesday 17:00-19:45 • Office Hour:OpenDoorPolicy
Course Objectives • Introduce computer and network security concepts. • Introduce confidentiality, integrity and availability • Develop some general design decisions that should be made when constructing secure systems • Present cryptography concepts.
Textbooks • William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, 2005. • Douglas Stinson, Cryptography: Theory and Practice, CRC Press, CRC Press LLC, 1995. • D. Hook, Beginning Cryptography with Java, Wrox Press, 2005 • J. B. Knudsen, Java Cryptography, First Ed., 1998. • R. Helton and J. Helton, Java Security Solutions, Wiley Publishing, Inc., 2002
Brief Contents • Introduction to Cryptography • Classical Encryption Techniques • Block Ciphers and the Data Encryption Standard • Advanced Encryption Standard • More on Symmetric Ciphers • Confidentiality Using Symmetric Encryption • Public-Key Cryptography and RSA • Key Management; Other Public-Key Cryptosystems • Message Authentication and Hash Functions • Hash and MAC Algorithms • Digital Signatures and Authentication Protocols • Authentication Applications • Electronic Mail Security • IP Security • Web Security • Intruders • Malicious Software • Firewalls
Grading • Subject Research 25% • Paper Presentation 25% • Final Examination 50%
Presentation • Wireless Security • Mobile security • E-mail security PGP • Database security • Biometrics authentication systems • Web security • E-commerce security • Digital Signature • IP security • VPN Security • Bluetooth Security • Watermarking and information hiding • VoIP Security • JAVA security • .NET Security • PHP security • Wireshark • NS2 • SNORT • OPNET