70 likes | 222 Views
DEPARTMENT of INFORMATION TECHNOLOGIES. INTERNATIONAL BURCH UNIVERSITY. CEN 621 Cryptography and Network Security 201 1 -201 2 Spring Term. Dr . Abdülhamit Subaşı asubasi @ ibu.edu.ba. Class Schedule: Tuesday 1 7 :00-1 9 : 45 Office Hour: Open Door Policy. Course Objectives.
E N D
DEPARTMENT of INFORMATION TECHNOLOGIES INTERNATIONAL BURCH UNIVERSITY CEN 621 Cryptography and Network Security 2011-2012Spring Term Dr. Abdülhamit Subaşıasubasi@ibu.edu.ba
Class Schedule: Tuesday 17:00-19:45 • Office Hour:OpenDoorPolicy
Course Objectives • Introduce computer and network security concepts. • Introduce confidentiality, integrity and availability • Develop some general design decisions that should be made when constructing secure systems • Present cryptography concepts.
Textbooks • William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, 2005. • Douglas Stinson, Cryptography: Theory and Practice, CRC Press, CRC Press LLC, 1995. • D. Hook, Beginning Cryptography with Java, Wrox Press, 2005 • J. B. Knudsen, Java Cryptography, First Ed., 1998. • R. Helton and J. Helton, Java Security Solutions, Wiley Publishing, Inc., 2002
Brief Contents • Introduction to Cryptography • Classical Encryption Techniques • Block Ciphers and the Data Encryption Standard • Advanced Encryption Standard • More on Symmetric Ciphers • Confidentiality Using Symmetric Encryption • Public-Key Cryptography and RSA • Key Management; Other Public-Key Cryptosystems • Message Authentication and Hash Functions • Hash and MAC Algorithms • Digital Signatures and Authentication Protocols • Authentication Applications • Electronic Mail Security • IP Security • Web Security • Intruders • Malicious Software • Firewalls
Grading • Subject Research 25% • Paper Presentation 25% • Final Examination 50%
Presentation • Wireless Security • Mobile security • E-mail security PGP • Database security • Biometrics authentication systems • Web security • E-commerce security • Digital Signature • IP security • VPN Security • Bluetooth Security • Watermarking and information hiding • VoIP Security • JAVA security • .NET Security • PHP security • Wireshark • NS2 • SNORT • OPNET