Cryptography and Network Security – 2015

SPRING 2015

Description


We cover in this course principles and practice of cryptography and network security: classical systems, symmetric block ciphers (DES, AES, other contemporary symmetric ciphers), linear and differential cryptanalysis, perfect secrecy, public-key cryptography  (RSA, discrete logarithms), algorithms for factoring and discrete logarithms, cryptographic protocols, hash functions, authentication, key management, key exchange, signature schemes, email and web security, viruses, firewalls, and other topics.

 

Content


  1. CONVENTIONAL ENCRYPTION
    • Classical Systems
    • Conventional Encryption: DES, AES
    • Contemporary Symmetric Ciphers: 3DES, RC4, RC5
  1. PUBLIC-KEY ENCRYPTION
    • Introduction to Number Theory
    • Public-Key Cryptography. RSA
    • Key Management
    • Message Authentication and Hash Functions
    • Hash and Mac Algorithms
    • Digital Signatures and Authentication Protocols
  1. AUTHENTICATION
    • MAC
    • Hash and message digests
    • Digital signatures
    • Passwords
    • Kerberos
  1. NETWORK SECURITY
    • Authentication Applications
    • Electronic Mail Security
    • IP Security
    • Web Security
  1. OTHER ISSUES
    • Intruders and Viruses
    • Firewalls
    • Digital cash
    • Secret sharing schemes
    • Zero-knowledge techniques
    • Folklore

 

Literature


  • Text book: Stallings, W., Cryptography and Network Security. Principles and Practice, 5th edition, Prentice Hall, 2011.
  • Other sources, including: Network Security. Private communication in a public worls, Prentice Hall, 2002.
  • Trappe, W., Washingotn, L.C., Introduction to Cryptography with coding theory, Pearson-Prentice Hall, 2006.
  • Tanenbaum, A.S., Computer Networks, 4th edition, Prentice Hall, 2003.
  • Stinson, D., Cryptography. Theory and Practice, 2nd edition, CRC Press, 2002.
  • Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1997.
  • Salomaa, A., Public-Key Cryptography, 2nd edition, Springer-Verlag, 1996.
  • Papadimitriou, C., Computational Complexity, Addison-Wesley, 1995.
  • Koblitz, N., A Course in Number Theory and Cryptography, 2nd edition, Springer 1994.
  • Bach, E., Shallit, J., Algorithmic Number Theory, Vol. I: Efficient Algorithms, 2nd printing, MIT Press, 1997.

 

Online resources


 

Credits


5 sp

 

Components


28h lectures, optional projects, final exam.

 

Time and place


  • Start date: 8th of January, 2015
  • End date: 24th of February, 2015
  • Tuesdays:
    • 13-15, Cobol
  • Thursdays:
    • 10-12, Cobol
January 8, 2015
  • January 8, 2015: Lecture 1: Introduction
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/8408w2nahytw2w4/lecture1.pdf?dl=0

January 13, 2015
  • January 13, 2015: Lecture 2: Classical encryption
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/95kzww4mbn6i0du/lecture2.pdf?dl=0
    W. Stallings, Chapter 2: Classical Encryption Techniques

January 15, 2015
  • January 15, 2015: Lecture 3: Block ciphers and DES
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/jj0o15rcvwengx8/lecture3.pdf?dl=0,
    W. Stallings, Chapter 3: Block Ciphers and the Data Encryption Standard

January 20, 2015
  • January 20, 2015: Lecture 4: Block cipher operation, RC5, RC4
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/ka5sgf5637e6cf4/lecture4.pdf?dl=0,
    W. Stallings,
    Chapter 6: Block Cipher Operation;
    Chapter 7, Section 7.5: RC4

January 22, 2015
  • January 22, 2015: Lecture 5: Basic notions of finite fields
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/bogivue1hcqkb6f/lecture5.pdf?dl=0,
    W. Stallings, Chapter 4: Basic Concepts in Number Theory and Finite Fields

January 27, 2015
  • January 27, 2015: Lecture 6: Advanced Encryption Standard (AES)
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/7vw19ky12r0qzem/lecture6.pdf?dl=0,
    W. Stallings, Chapter 5: Advanced Encryption Standard

January 29, 2015
  • January 29, 2015: Lecture 7: Advanced Encryption Standard (AES)
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/7vw19ky12r0qzem/lecture6.pdf?dl=0,
    W. Stallings, Chapter 5: Advanced Encryption Standard

February 3, 2015
  • February 3, 2015: Lecture 8: Public-key cryptography and RSA
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/9bvbkd56ejj2pbo/lecture7.8.pdf?dl=0
    W. Stallings, Chapter 9: Public-Key Cryptography and RSA

February 5, 2015
  • February 5, 2015: Lecture 9: Authentication protocols, digital signatures
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/ttni6pc17ebipjp/lecture8.9.pdf?dl=0
    W. Stallings, Chapter 14
    Section 14.3: Distribution of Public Keys;
    Section 14.4: X.509 Certificates;
    Section 14.5: Public-Key Infrastructure

February 10, 2015
  • February 10, 2015: Lecture 10: Authentication protocols, digital signatures
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/j7d3577bvr5cgx6/lecture9.10.pdf?dl=0
    W. Stallings, Chapter 15: User Authentication
    http://britcruise.com/tag/diffie-hellman-key-exchange, Diffie-Hellman Key Exchange, Khan Academy, Brit Cruise

February 12, 2015
  • February 12, 2015: Lecture 11: Message authentication: MAC, hashes
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/79u3lu84v0gu37q/lecture10.11.pdf?dl=0
    W. Stallings, Chapter 12: Message Authentication Codes

February 17, 2015
  • February 17, 2015: Lecture 12: Message authentication: MD5, SHA-1, HMAC
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/gkm6wznx8dgivtm/lecture11.12.pdf?dl=0
    https://www.dropbox.com/s/ibqtuakt3wuvpdt/lecture12.13.pdf?dl=0
    W. Stallings, Chapter 11: Cryptographic Hash Functions;
    W. Stallings, L. Brown,
    Section 21.1: Secure Hash Functions;
    Section 21.2: HMAC;
    Ch. Kaufman, R. Perlman, R. Speciner
    Section 5.5: MD5;
    Section 5.6: SHA-1;
    Section 5.7: HMAC

February 19, 2015
  • February 19, 2015: Lecture 13: Email security: PGP and S/MIME, Web security, IP Security, Firewalls
    10:00 am - 12:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/ibqtuakt3wuvpdt/lecture12.13.pdf?dl=0,
    https://www.dropbox.com/s/67rxjkju3zedtbx/lecture13.pdf?dl=0
    W. Stallings, Chapter 18: Electronic Mail Security

February 24, 2015
  • February 24, 2015: Lecture 14: Firewalls, Wireless security, Password management, Viruses
    1:00 pm - 3:00 pm, Cobol, 3rd floor, ICT-talo,

    https://www.dropbox.com/s/hb2509crgyt2jjl/lecture14.pdf?dl=0
    W. Stallings
    Chapter 16: Transport-Level Security;
    Chapter 19: IP Security;
    Ch. Kaufman, R. Perlman, R. Speciner, Chapter 23: Firewalls
    W. Stallings, Chapter 17: Wireless Network Security;
    W. Stallings, L. Brown
    Chapter 8: Intrusion Detection;
    Chapter 6: Malicious Software

Prerequisites


The courses on “Programmering (grundkurs)”, “Programmering (fortsättningskurs)”, “Praktikum i programmering”, “Datastrukturer”, “Algoritmer”. Familiarity with computers, Internet, email, computer viruses and average-level mathematics. Advanced mathematics (including elements of number theory and finite fields) will be introduced throughout the course whenever needed.

 

Registration (also for the exam)


Through MinPlan.

 

Lecturer


Dr. Vladimir Rogojin (vrogojin at abo.fi, room B5078, ICT-house)

Department of IT, Åbo Akademi University.

 

Lecture slides and recommended reading

  • W. Stallings – Stallings, W., Cryptography and Network Security. Principles and Practice, 6th edition, Prentice Hall, 2013
  • W. Stallings, L. Brown,  Computer Security. Principles and Practice, 2nd edition, Pearson Education Ltd., 2012
  • Ch. Kaufman, R. Perlman, R. Speciner, Network Security. Private communication in a public worls, Prentice Hall, 2002.

 

Protected: Assignments and gained scores

There is no excerpt because this is a protected post.

View page »