SJSU EE 289 - Syllabus (4 pages)

Previewing page 1 of 4 page document View the full content.
View Full Document

Syllabus



Previewing page 1 of actual document.

View the full content.
View Full Document
View Full Document

Syllabus

149 views


Pages:
4
School:
San Jose State University
Course:
Ee 289 - Special Topics in Networking

Unformatted text preview:

SAN JOSE STATE UNIVERSITY COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRICAL ENGINEERING EE 289 Network Security Dr Balaji Venkatraman Spring 2007 Email balaji sjsu gmail com Class SH 239 Dates 1 24 2007 5 15 2007 Time Tuesday Thursday 7 30 8 45 PM Course Objectives The course provides the underlying principles and practices of modern network security Network security architectures and protocols are examined and emphasis is given to their performance and implementation aspects Symmetric and public key encryption schemes are discussed and their mathematical foundations are examined in details Authentication hash functions and key management schemes are also covered and their impacts on computer security are compared Prerequisite Graduate status or instructor s permission Internetworking background is a plus Topics Covered Network Vulnerabilities identify and define the different threats to network systems secrecy authentication and data integrity Cryptography Principles mathematical foundations number theory for commonly used crypto algorithms are discussed Symmetric Key Algorithms Data Encryption Standard DES RC4 and Advanced Encryption Standard AES are discussed and their performances are compared The Different types of encryption mode are explained and their pros and cons are discussed Electronic Code Book Mode Cipher Block Chaining Mode Cipher Feedback Mode Stream Cipher and Counter Modes Public Key Algorithms Detailed implementation of the RSA algorithm is provided and when it is more practical to use Public Key algorithms is discussed Key Distribution Electronic Digital Signatures are defined using symmetric key and publickey approaches Message Digest MD5 as alternative solutions to digital signature is also discussed IPSec IKE Here we use IKE as study case for security association SA authentication and key management schemes Textbook 1 Mark Stamp Information Security Principles and Practice John Wiley 2006 References 1 W Stallings Cryptography and Network



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Syllabus and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?