SJSU EE 289 - Syllabus (4 pages)

Previewing page 1 of 4 page document View the full content.
View Full Document

Syllabus



Previewing page 1 of actual document.

View the full content.
View Full Document
View Full Document

Syllabus

158 views


Pages:
4
School:
San Jose State University
Course:
Ee 289 - Special Topics in Networking
Unformatted text preview:

SAN JOSE STATE UNIVERSITY COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRICAL ENGINEERING EE 289 Network Security Dr Balaji Venkatraman Spring 2007 Email balaji sjsu gmail com Class SH 239 Dates 1 24 2007 5 15 2007 Time Tuesday Thursday 7 30 8 45 PM Course Objectives The course provides the underlying principles and practices of modern network security Network security architectures and protocols are examined and emphasis is given to their performance and implementation aspects Symmetric and public key encryption schemes are discussed and their mathematical foundations are examined in details Authentication hash functions and key management schemes are also covered and their impacts on computer security are compared Prerequisite Graduate status or instructor s permission Internetworking background is a plus Topics Covered Network Vulnerabilities identify and define the different threats to network systems secrecy authentication and data integrity Cryptography Principles mathematical foundations number theory for commonly used crypto algorithms are discussed Symmetric Key Algorithms Data Encryption Standard DES RC4 and Advanced Encryption Standard AES are discussed and their performances are compared The Different types of encryption mode are explained and their pros and cons are discussed Electronic Code Book Mode Cipher Block Chaining Mode Cipher Feedback Mode Stream Cipher and Counter Modes Public Key Algorithms Detailed implementation of the RSA algorithm is provided and when it is more practical to use Public Key algorithms is discussed Key Distribution Electronic Digital Signatures are defined using symmetric key and publickey approaches Message Digest MD5 as alternative solutions to digital signature is also discussed IPSec IKE Here we use IKE as study case for security association SA authentication and key management schemes Textbook 1 Mark Stamp Information Security Principles and Practice John Wiley 2006 References 1 W Stallings Cryptography and Network Security Principles and Practice 4th E PH 2005 2 Kaufman Network Security Private Communication in Public World 2nd E PH 2002 Grading Policy The overall course grades letter grades will be assigned based on the overall class distribution The weights of class assignments and the project are as listed below Midterm Exam Homework Project Final Exam Total 30 20 20 30 100 Examinations There will be one midterm exam and a final examination Exams are closed book and notes Exams cover o Assigned reading materials from the textbook o Discussed materials in the lectures o Class handouts and notes o Homework and practice problems Exams will be announced at least one week prior to administration There will be no make up exams Homework Homework assignments will be given periodically and graded Course Outline Based on the material of chapters 1 to 13 of the textbook I Introduction Security attacks and security terminology Trudy Bob Alice Encryption model and techniques Block Cipher design principles and modes II Symmetric Key Algorithms Symmetric Substitution transposition techniques Steganography Data Encryption Standard DES Encryption modes Electronic Code Book Mode Cipher Block Chaining Mode Cipher Feedback Mode Stream Cipher and Counter Modes Advanced Encryption Standard AES Other symmetric ciphers RC4 and RC5 III Public Key Algorithms and Hash Functions Finite Fields A Second Look Prime number Fermat s and Euler s Theorems Chinese Remainder Discrete log Principles of Public key cryptosystems RSA algorithm Key management Diffie Hellman key exchange Hash Function MD5 SHA 1 IV Authentication and Digital Signatures Authentication protocols using symmetric keys key distribution Traffic Confidentiality Authentication protocols using public keys Digital signatures V Key management and IPSec IPSec architecture overview IKE EE SJSU Honesty and Respect for Others and Public Property EE HONOR CODE The Electrical Engineering Department will enforce the following Honor Code that must be read and accepted by all students I have read the Honor Code and agree with its provisions My continued enrollment in this course constitutes full acceptance of this code I will NOT Take an exam in place of someone else or have someone take an exam in my place Give information or receive information from another person during an exam Use more reference material during an exam than is allowed by the instructor Obtain a copy of an exam prior to the time it is given Alter an exam after it has been graded and then return it to the instructor for regrading Leave the exam room without returning the exam to the instructor Measures Dealing with Occurrences of Cheating Department policy mandates that the student or students involved in cheating will receive an F on that evaluation instrument paper exam project homework etc and will be reported to the Department and the University A student s second offense in any course will result in a Department recommendation of suspension from the University


View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Syllabus and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?