PowerPoint PresentationSlide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15Slide 16Slide 17Slide 18Slide 19Slide 20Slide 21Slide 22Slide 23Slide 24Slide 25Slide 26Slide 27Slide 28Slide 29Slide 30Slide 31Slide 32Slide 33Slide 34Slide 35Slide 36Slide 37Selected ASIC Security ChipsSlide 39Slide 40Slide 41Slide 42SurveySecurity of RFIDsSlide 45Slide 46Course web page: http://ece.gmu.edu/courses/ECE543ECE 646Cryptography and Computer Network SecurityECE web page Courses Course web pages ECE 646Assistant Professor at GMU since Fall 1998Kris GajOffice hours: Tuesdays, after the class Monday, 5:00-6:00 PM (at GMU)Research and teaching interests:• cryptography• network security• computer arithmetic• VLSI design and testingContact:Science & Technology II, room 223 [email protected], (703) 993-1575ECE 646Part of:MS in EEMS in CpENetwork and System SecurityComputer NetworksCertificate in Information Systems SecurityMS in E-CommerceMS in Information Security and AssuranceECE 646LectureProjectLaboratory35 %10 % Homework 25 %Midterm exams 20 % in class 10 % take homeSpecification - 5 %Results - 12 %Oral presentation - 10%Written report - 8%• viewgraphs / chalk & blackboard• viewgraphs available on the web (please, extend with your notes)• books 1 required (Stallings) 2 optional (available on reserve in the Johnson Center)• articles (CryptoBytes, RSA Data Security Conf., CHES, CRYPTO, etc.)• web sites - Crypto Resources standards, FAQs, surveysLectureHomework (1)• reading assignments• theoretical problems (may require basics of number theory or probability theory)• problems from the main textbook• short programs• literature surveysHomework (2)• optional assignmentsshort programs vs. analytical problems or HDL codes More time consuming Most time spent on debugging Relatively straightforward Typically less time consuming More thinking Little writingMidterm exam 1 3 hours multiple choice test + short problems open-books, open-notes practice exams available on the webTuesday, November 9thTentative date:Midterm Exam 2 take-home 24 hours literature search + analytical problemsSunday, December 12thTentative date:• 3-4 labs• based on the GMU educational software, public domain cryptographic programs & libraries, or evaluation versions of commercial products• done at home; software downloaded from the web• based on detailed instructions• grading based on written reports (answers to questions included in the instructions)LaboratoryTentative list of laboratory topics1. Properties of classical cryptosystems2. Properties of public key cryptosystems3. Properties of hash functions4. Secure e-mail: Pretty Good Privacy and S/MIME• depth, originality• based on additional literature• you can start in the point where former students ended• based on something you know and are interested in• software / hardware / analytical• teams of 1-3 students• may involve experiments • several project topics proposed by the instructor• you can propose your own topicProject (1)• two weeks to choose a topic and write the corresponding specification• regular meetings with the instructor• 3-4 oral progress reports based on Power Point slides• draft final presentation due at the last progress report Tuesday, December 7• written report/article, 15-page IEEE style due Saturday December 11• short conference-style oral presentations Tuesday, December 21• contest for the best presentation• publication of reports and viewgraphs on the webProject (2)• Project reports/articles requirements- IEEE style- 15 pages maximum- appendices possible but do not influence the evaluation- source codes made available to the instructor• Review of project reports- reviews done by your fellow students- reviews due Tuesday, December 14Project (3)Project TypesSoftwareprogram in a high-level language (C, C++, Java)or assembly languageHardwareRTL model in HDL(VHDL, Verilog)mapped into FPGA or ASIC,verified using timing simulationAnalyticalcomparative analysis of competing algorithms, protocols, or implementationssurvey of the marketFollow-up coursesCryptography and Computer Network Security ECE 646Secure Telecommunication SystemsECE 746Computer ArithmeticECE 645Cryptography and Computer Network SecuritySecure Telecommunication Systems• AES• Stream ciphers• Elliptic curve cryptosystems• Random number generators• Smart cards• Attacks against implementations (timing, power analysis)• Efficient and secure implementations of cryptography• Security in various kinds of networks (IPSec, wireless)• Zero-knowledge identification schemes• Historical ciphers• Classical encryption (DES, IDEA, RC5, AES)• Public key encryption (RSA, DH, DSA)• Hash functions and MACs • Digital signatures• Public key certificates• Secure Internet Protocols - e-mail: PGP and S-MIME - www: SSL• Cryptographic standardsModular integer arithmeticOperations in the Galois Fields GF(2n)“Typical” coursetimedifficultyThis coursedifficultytimeEducational software for a cryptographic laboratoryProject topics - SoftwarePrerequisites: C/C++Examples of tasks:• provide a choice of an underlying library - currently only Crypto++ - faster libraries available but more difficult to integrate• statistical tests for randomness of input, output, and intermediate results• turning an internal project into an open-source projectIdea: Develop extensions to the existing GMU educational software for teaching cryptography - KRYPTOSAshraf AbuSharekhMS Thesis, April 2004Comparative Analysis of SoftwareMulti-precision Arithmetic Librariesfor Public Key CryptographySupportHighSchemesLowPrimitivesLowCryptoPPPIOLOGIEOpenSSLMIRACLPerformanceGMP,NTL, LiDIACLNHighSupportHighSchemesLowPrimitivesLowCryptoPPPIOLOGIEOpenSSLMIRACLPerformanceGMP,NTL, LiDIACLNHighCAMERA v1.0CAMERA v1.0by Mike LyonsInstructor in the BS IT and MS TCOM programsDesign philosophy:Enable experiential learningby creating an interactive environment- learn by doingMake it visual- images reinforce concepts- color and movement are attractive, (especially to young students)User experience:•Based on a graphical user interface (GUI)- windows, draggable icons, mouse-driven- look-and-feel is
View Full Document