DOC PREVIEW
SJSU EE 289 - Syllabus

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

DEPARTMENT OF ELECTRICAL ENGINEERINGEE 289: Network Security Dr. Balaji VenkatramanA student’s second offense in any course will result in a DeSAN JOSE STATE UNIVERSITY COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRICAL ENGINEERING EE 289: Network Security Dr. Balaji Venkatraman Spring 2007 Email: [email protected]: SH 239 Dates: 1/24/2007 – 5/15/2007 Time: Tuesday, Thursday @ 7.30-8.45 PM Course Objectives:The course provides the underlying principles and practices of modern network security. Network security architectures and protocols are examined and emphasis is given to their performance and implementation aspects. Symmetric and public-key encryption schemes are discussed and their mathematical foundations are examined in details. Authentication, hash functions, and key management schemes are also covered and their impacts on computer security are compared. Prerequisite: Graduate status, or instructor’s permission. Internetworking background is a plus. Topics Covered: • Network Vulnerabilities: identify and define the different threats to network systems: secrecy, authentication and data integrity. • Cryptography Principles: mathematical foundations (number theory) for commonly used crypto –algorithms are discussed.• Symmetric-Key Algorithms: Data Encryption Standard (DES), RC4, and Advanced Encryption Standard (AES) are discussed and their performances are compared. • The Different types of encryption mode are explained and their pros and cons are discussed: Electronic Code Book Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Stream Cipher and Counter Modes. • Public-Key Algorithms: Detailed implementation of the RSA algorithm is provided and when it is more practical to use Public-Key algorithms is discussed: Key Distribution. • Electronic Digital Signatures: are defined using symmetric-key and public-key approaches. Message Digest, MD5, as alternative solutions to digital signature is also discussed. • IPSec (IKE): Here we use IKE as study case for security association (SA), authentication and key management schemes. Textbook:1. Mark Stamp, Information Security: Principles and Practice, John Wiley, 2006 References:1. W. Stallings, Cryptography and Network Security: Principles and Practice, 4 Eth, PH 2005. 2. Kaufman, Network Security, Private Communication in Public World, 2nd E, PH 2002. Grading Policy: The overall course grades (letter-grades) will be assigned based on the overall class distribution. The weights of class assignments and the project are as listed below. Midterm Exam 30% Homework 20% Project 20% Final Exam 30% Total 100% Examinations: • There will be one midterm exam and a final examination. Exams are closed book and notes. • Exams cover: o Assigned reading materials from the textbook o Discussed materials in the lectures o Class handouts and notes o Homework and practice problems • Exams will be announced at least one week prior to administration. • There will be no make-up exams.Homework: Homework assignments will be given periodically and graded. Course Outline:Based on the material of chapters 1-to-13 of the textbook: I. Introduction • Security attacks and security terminology: Trudy, Bob, Alice … • Encryption model and techniques • Block Cipher design principles and modes II. Symmetric-Key Algorithms • Symmetric, Substitution, transposition techniques • Steganography • Data Encryption Standard (DES) • Encryption modes Electronic Code Book Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Stream Cipher and Counter Modes. • Advanced Encryption Standard (AES) • Other symmetric ciphers: RC4 and RC5 III. Public-Key Algorithms and Hash Functions • Finite Fields— A Second Look: Prime number, Fermat’s and Euler’s Theorems, Chinese Remainder, Discrete log • Principles of Public-key cryptosystems • RSA algorithm • Key management • Diffie-Hellman key exchange • Hash Function: MD5, SHA-1 IV. Authentication and Digital Signatures • Authentication protocols using symmetric-keys, key distribution, Traffic Confidentiality. • Authentication protocols using public-keys • Digital signatures V. Key management and IPSec• IPSec architecture overview • IKEEE@SJSU Honesty and Respect for Others and Public Property EE HONOR CODE The Electrical Engineering Department will enforce the following Honor Code that must be read and accepted by all students. “I have read the Honor Code and agree with its provisions. My continued enrollment in this course constitutes full acceptance of this code. I will NOT: • Take an exam in place of someone else, or have someone take an exam in my place • Give information or receive information from another person during an exam • Use more reference material during an exam than is allowed by the instructor • Obtain a copy of an exam prior to the time it is given • Alter an exam after it has been graded and then return it to the instructor for re-grading • Leave the exam room without returning the exam to the instructor.” Measures Dealing with Occurrences of Cheating • Department policy mandates that the student or students involved in cheating will receive an “F” on that evaluation instrument (paper, exam, project, homework, etc.) and will be reported to the Department and the University. A student’s second offense in any course will result in a Department recommendation of suspension from the


View Full Document

SJSU EE 289 - Syllabus

Documents in this Course
Load more
Download Syllabus
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Syllabus 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?