1 / 7

CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz

An overview of essential cryptographic building blocks, network security protocols, key management, and advanced topics in network security. The course covers cryptographic primitives like DES and AES, symmetric and asymmetric key exchange, encryption algorithms, authentication, handshake principles, network security protocols like SSL/TLS and IPSec, IoT key distribution, group key establishment, and privacy in cloud and wireless systems. Homeworks, mini-projects, and extra credit quizzes enhance hands-on learning with cryptographic libraries and protocols implementation.

rogerkrause
Download Presentation

CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz Course Overview and Organization Dr. Attila Altay Yavuz Spring 2018

  2. High-Level Objectives • Cryptographic primitives and Net. Sec. foundations: • Essential cryptographic building blocks • Their properties and use • Basic Service: Authentication and Handshakes • Primitives • Protocols • Key Management and Establishment Protocols • Network Security Protocols • Selected Advanced Topics

  3. Pre-reqs and Grading • Required: • Good C/C++ programming • CS 372 and CS 321 • Desirable but not required: Previous security courses • CS 370 or CS 427 • Grading: No mid-term or final! • 5 Homeworks (10% each): 50% total • HWs are research-oriented (10 days each) • 3-4 Mini-projects in form of labs: 50% total • You will have access to remote Virtual Machines (VMs) to work • Implementation of network security protocols with crypto libraries • Around 2-weeks duration each • Extra credit quizzes (e.g., 7-8%)

  4. Topics – Syllabi Outline – TENTATIVE TIMING • Week 1-2: Hash-based primitives and Net. Sec. Tools • Week 3-4: Preparation for Network Security Protocols • Symmetric Primitives: DES and AES (not covered in CS 427) • Key Exchange: DH and Certificates (quick recap with some number theory) • Encryption/Authentication: Elgamal, Schnorr, DSA, (not covered in CS 427) • Week 4-5-6: Net. Sec. Protocols • Handshake principles, replay attacks, etc.. • Needham-Schroeder,Otway-Rees, Kerberos, Station-to-Station protocol, common mistakes • Week 6-7: Net. Sec. Protocols • SSL/TLS • IPSec, Basic Cloud Security • Week 7-8: Key Management and Establishment: IoT Key Distribution • Group Key Establishment: GDH protocols • Group Key Management: Iolus, Logical Key Hierarchy, Key Trees • Week 9: Privacy in Cloud and Emerging Wireless Systems • Searchable Encryption for Cloud Storage: Privacy versus data utilization dilemma • Location-Privacy in Cognitive Radio Networks • Week 10: Selected Topics in Emerging Network Security

  5. Pre-reqs and Grading • Homeworks (5 HWs, each has generally 5-6 questions): • Some asks you to dig deeper in topics covered in class • Some complements topics not covered in class: Research-based questions • Some involve a proof or algorithm analysis • Mini-projects (3-4 lab assignments) • ZeroMQ network package to connect processes, remote access for implementation • MIRACL cryptographic library for protocol implementation • Counter Denial of Service Tool • Implement a client-server puzzle with client-server model • Authentication at Post-Quantum Era • Implement a simple multiple-time hash based signature • A Secure Digital Forensic Tool: Loss/Compromise Resilient Logger • Implement forward-secure and aggregate authentication for logs • Compression and information dispersal for network resiliency • Implement your mini TLS • Implement an authenticated TLS handshake with certificates and ECC Crypto

  6. Logistics and Notes • Instructor Office Hours and Course Webpage: • Tuesday 2:00 – 4:00 PM (to be updated), KEC 3065 • http://web.engr.oregonstate.edu/~yavuza/ • Class email (important!) and in-class announcement • Your TA and Office Hours: • Mr. Rouzbeh Behnia, John 125 • Monday and Wednesday, 12:00 – 1:30 PMs (extra grading hours will be hold). • Grading and assignment related questions go to TA, everything else is me. • A protocol and cryptography oriented approach to network security • This is not a system security course! No hacking, etc… • Plenty of protocols, coding and cryptography! • Instructor Travels • 2 weeks of travel (out of state and out of US) • 1 week will be covered by guest faculty • 1 week will be covered by TA

  7. Extra Resources (not required but optional) • No textbook is required. Lecture slides and reading papers will be provided at course website.  However, some optional books that may be useful: • Charlie Kaufman, Radia Perlman, and Mike Speciner, “Network Security: Private Communication in a Public World”, Second Edition, Prentice Hall. (some slides and assignments are from this book) • Douglas R. Stinson, “Cryptography Theory and Practice, 3rd edition". • Jonathan Katz & Yehuda Lindell , “Introduction to Modern Cryptography”. • Free online cryptography resources: • Lecture notes of Dr. Mihir Bellare: https://cseweb.ucsd.edu/~mihir/cse207/classnotes.html • "The Joy Cryptography" from Dr. Mike Rosulek: http://web.engr.oregonstate.edu/~rosulekm/crypto/

More Related