1 / 7

CEN 621 Cryptography and Network Security 201 1 -201 2 Spring Term

DEPARTMENT of INFORMATION TECHNOLOGIES. INTERNATIONAL BURCH UNIVERSITY. CEN 621 Cryptography and Network Security 201 1 -201 2 Spring Term. Dr . Abdülhamit Subaşı asubasi @ ibu.edu.ba. Class Schedule: Tuesday 1 7 :00-1 9 : 45 Office Hour: Open Door Policy. Course Objectives.

neorah
Download Presentation

CEN 621 Cryptography and Network Security 201 1 -201 2 Spring Term

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DEPARTMENT of INFORMATION TECHNOLOGIES INTERNATIONAL BURCH UNIVERSITY CEN 621 Cryptography and Network Security 2011-2012Spring Term Dr. Abdülhamit Subaşıasubasi@ibu.edu.ba

  2. Class Schedule: Tuesday 17:00-19:45 • Office Hour:OpenDoorPolicy

  3. Course Objectives • Introduce computer and network security concepts. • Introduce confidentiality, integrity and availability • Develop some general design decisions that should be made when constructing secure systems • Present cryptography concepts.

  4. Textbooks • William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, 2005. • Douglas Stinson, Cryptography: Theory and Practice, CRC Press, CRC Press LLC, 1995. • D. Hook, Beginning Cryptography with Java, Wrox Press, 2005 • J. B. Knudsen, Java Cryptography, First Ed., 1998. • R. Helton and J. Helton, Java Security Solutions, Wiley Publishing, Inc., 2002

  5. Brief Contents • Introduction to Cryptography • Classical Encryption Techniques • Block Ciphers and the Data Encryption Standard • Advanced Encryption Standard • More on Symmetric Ciphers • Confidentiality Using Symmetric Encryption • Public-Key Cryptography and RSA • Key Management; Other Public-Key Cryptosystems • Message Authentication and Hash Functions • Hash and MAC Algorithms • Digital Signatures and Authentication Protocols • Authentication Applications • Electronic Mail Security • IP Security • Web Security • Intruders • Malicious Software • Firewalls

  6. Grading • Subject Research 25% • Paper Presentation 25% • Final Examination 50%

  7. Presentation • Wireless Security • Mobile security • E-mail security PGP • Database security • Biometrics authentication systems • Web security • E-commerce security • Digital Signature • IP security • VPN Security • Bluetooth Security • Watermarking and information hiding • VoIP Security • JAVA security • .NET Security • PHP security • Wireshark • NS2 • SNORT • OPNET

More Related