SPRING 2015
Description
We cover in this course principles and practice of cryptography and network security: classical systems, symmetric block ciphers (DES, AES, other contemporary symmetric ciphers), linear and differential cryptanalysis, perfect secrecy, publickey cryptography (RSA, discrete logarithms), algorithms for factoring and discrete logarithms, cryptographic protocols, hash functions, authentication, key management, key exchange, signature schemes, email and web security, viruses, firewalls, and other topics.
Content
 CONVENTIONAL ENCRYPTION
 Classical Systems
 Conventional Encryption: DES, AES
 Contemporary Symmetric Ciphers: 3DES, RC4, RC5
 PUBLICKEY ENCRYPTION
 Introduction to Number Theory
 PublicKey Cryptography. RSA
 Key Management
 Message Authentication and Hash Functions
 Hash and Mac Algorithms
 Digital Signatures and Authentication Protocols
 AUTHENTICATION
 MAC
 Hash and message digests
 Digital signatures
 Passwords
 Kerberos
 NETWORK SECURITY
 Authentication Applications
 Electronic Mail Security
 IP Security
 Web Security
 OTHER ISSUES
 Intruders and Viruses
 Firewalls
 Digital cash
 Secret sharing schemes
 Zeroknowledge techniques
 Folklore
Literature
 Text book: Stallings, W., Cryptography and Network Security. Principles and Practice, 5th edition, Prentice Hall, 2011.
 Other sources, including: Network Security. Private communication in a public worls, Prentice Hall, 2002.
 Trappe, W., Washingotn, L.C., Introduction to Cryptography with coding theory, PearsonPrentice Hall, 2006.
 Tanenbaum, A.S., Computer Networks, 4th edition, Prentice Hall, 2003.
 Stinson, D., Cryptography. Theory and Practice, 2nd edition, CRC Press, 2002.
 Menezes, A., van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1997.
 Salomaa, A., PublicKey Cryptography, 2nd edition, SpringerVerlag, 1996.
 Papadimitriou, C., Computational Complexity, AddisonWesley, 1995.
 Koblitz, N., A Course in Number Theory and Cryptography, 2nd edition, Springer 1994.
 Bach, E., Shallit, J., Algorithmic Number Theory, Vol. I: Efficient Algorithms, 2nd printing, MIT Press, 1997.
Online resources
 Online resources of Stallings’s Cryptography and Network Security. Principles and Practice, 5th edition.
 Online resources of Tanenbaum’s Computer Networks 4th edition.
 Online resources of Menez, van Oorschot, Vanstone’s Handbook of Applied Cryptography (all chapters available online).
 Previous course page
Credits
5 sp
Components
28h lectures, optional projects, final exam.
Time and place
 Start date: 8th of January, 2015
 End date: 24th of February, 2015
 Tuesdays:
 1315, Cobol
 Thursdays:
 1012, Cobol
 January 8, 2015


January 8, 2015: Lecture 1: Introduction10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/8408w2nahytw2w4/lecture1.pdf?dl=0

 January 13, 2015


January 13, 2015: Lecture 2: Classical encryption1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/95kzww4mbn6i0du/lecture2.pdf?dl=0
W. Stallings, Chapter 2: Classical Encryption Techniques

 January 15, 2015


January 15, 2015: Lecture 3: Block ciphers and DES10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/jj0o15rcvwengx8/lecture3.pdf?dl=0,
W. Stallings, Chapter 3: Block Ciphers and the Data Encryption Standard

 January 20, 2015


January 20, 2015: Lecture 4: Block cipher operation, RC5, RC41:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/ka5sgf5637e6cf4/lecture4.pdf?dl=0,
W. Stallings,
Chapter 6: Block Cipher Operation;
Chapter 7, Section 7.5: RC4

 January 22, 2015


January 22, 2015: Lecture 5: Basic notions of finite fields10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/bogivue1hcqkb6f/lecture5.pdf?dl=0,
W. Stallings, Chapter 4: Basic Concepts in Number Theory and Finite Fields

 January 27, 2015


January 27, 2015: Lecture 6: Advanced Encryption Standard (AES)1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/7vw19ky12r0qzem/lecture6.pdf?dl=0,
W. Stallings, Chapter 5: Advanced Encryption Standard

 January 29, 2015


January 29, 2015: Lecture 7: Advanced Encryption Standard (AES)10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/7vw19ky12r0qzem/lecture6.pdf?dl=0,
W. Stallings, Chapter 5: Advanced Encryption Standard

 February 3, 2015


February 3, 2015: Lecture 8: Publickey cryptography and RSA1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/9bvbkd56ejj2pbo/lecture7.8.pdf?dl=0
W. Stallings, Chapter 9: PublicKey Cryptography and RSA

 February 5, 2015


February 5, 2015: Lecture 9: Authentication protocols, digital signatures10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/ttni6pc17ebipjp/lecture8.9.pdf?dl=0
W. Stallings, Chapter 14
Section 14.3: Distribution of Public Keys;
Section 14.4: X.509 Certificates;
Section 14.5: PublicKey Infrastructure

 February 10, 2015


February 10, 2015: Lecture 10: Authentication protocols, digital signatures1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/j7d3577bvr5cgx6/lecture9.10.pdf?dl=0
W. Stallings, Chapter 15: User Authentication
http://britcruise.com/tag/diffiehellmankeyexchange, DiffieHellman Key Exchange, Khan Academy, Brit Cruise

 February 12, 2015


February 12, 2015: Lecture 11: Message authentication: MAC, hashes10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/79u3lu84v0gu37q/lecture10.11.pdf?dl=0
W. Stallings, Chapter 12: Message Authentication Codes

 February 17, 2015


February 17, 2015: Lecture 12: Message authentication: MD5, SHA1, HMAC1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/gkm6wznx8dgivtm/lecture11.12.pdf?dl=0
https://www.dropbox.com/s/ibqtuakt3wuvpdt/lecture12.13.pdf?dl=0
W. Stallings, Chapter 11: Cryptographic Hash Functions;
W. Stallings, L. Brown,
Section 21.1: Secure Hash Functions;
Section 21.2: HMAC;
Ch. Kaufman, R. Perlman, R. Speciner
Section 5.5: MD5;
Section 5.6: SHA1;
Section 5.7: HMAC

 February 19, 2015


February 19, 2015: Lecture 13: Email security: PGP and S/MIME, Web security, IP Security, Firewalls10:00 am  12:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/ibqtuakt3wuvpdt/lecture12.13.pdf?dl=0,
https://www.dropbox.com/s/67rxjkju3zedtbx/lecture13.pdf?dl=0
W. Stallings, Chapter 18: Electronic Mail Security

 February 24, 2015


February 24, 2015: Lecture 14: Firewalls, Wireless security, Password management, Viruses1:00 pm  3:00 pm, Cobol, 3rd floor, ICTtalo,
https://www.dropbox.com/s/hb2509crgyt2jjl/lecture14.pdf?dl=0
W. Stallings
Chapter 16: TransportLevel Security;
Chapter 19: IP Security;
Ch. Kaufman, R. Perlman, R. Speciner, Chapter 23: Firewalls
W. Stallings, Chapter 17: Wireless Network Security;
W. Stallings, L. Brown
Chapter 8: Intrusion Detection;
Chapter 6: Malicious Software

Prerequisites
The courses on “Programmering (grundkurs)”, “Programmering (fortsättningskurs)”, “Praktikum i programmering”, “Datastrukturer”, “Algoritmer”. Familiarity with computers, Internet, email, computer viruses and averagelevel mathematics. Advanced mathematics (including elements of number theory and finite fields) will be introduced throughout the course whenever needed.
Registration (also for the exam)
Through MinPlan.
Lecturer
Dr. Vladimir Rogojin (vrogojin at abo.fi, room B5078, ICThouse)
Department of IT, Åbo Akademi University.
Lecture slides and recommended reading
 W. Stallings – Stallings, W., Cryptography and Network Security. Principles and Practice, 6th edition, Prentice Hall, 2013
 W. Stallings, L. Brown, Computer Security. Principles and Practice, 2nd edition, Pearson Education Ltd., 2012
 Ch. Kaufman, R. Perlman, R. Speciner, Network Security. Private communication in a public worls, Prentice Hall, 2002.