DOC PREVIEW
MASON ECE 646 - Cryptography and Computer Network Security

This preview shows page 1-2-3-22-23-24-44-45-46 out of 46 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PowerPoint PresentationSlide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15Slide 16Slide 17Slide 18Slide 19Slide 20Slide 21Slide 22Slide 23Slide 24Slide 25Slide 26Slide 27Slide 28Slide 29Slide 30Slide 31Slide 32Slide 33Slide 34Slide 35Slide 36Slide 37Selected ASIC Security ChipsSlide 39Slide 40Slide 41Slide 42SurveySecurity of RFIDsSlide 45Slide 46Course web page: http://ece.gmu.edu/courses/ECE543ECE 646Cryptography and Computer Network SecurityECE web page  Courses  Course web pages  ECE 646Assistant Professor at GMU since Fall 1998Kris GajOffice hours: Tuesdays, after the class Monday, 5:00-6:00 PM (at GMU)Research and teaching interests:• cryptography• network security• computer arithmetic• VLSI design and testingContact:Science & Technology II, room 223 [email protected], (703) 993-1575ECE 646Part of:MS in EEMS in CpENetwork and System SecurityComputer NetworksCertificate in Information Systems SecurityMS in E-CommerceMS in Information Security and AssuranceECE 646LectureProjectLaboratory35 %10 % Homework 25 %Midterm exams 20 % in class 10 % take homeSpecification - 5 %Results - 12 %Oral presentation - 10%Written report - 8%• viewgraphs / chalk & blackboard• viewgraphs available on the web (please, extend with your notes)• books 1 required (Stallings) 2 optional (available on reserve in the Johnson Center)• articles (CryptoBytes, RSA Data Security Conf., CHES, CRYPTO, etc.)• web sites - Crypto Resources standards, FAQs, surveysLectureHomework (1)• reading assignments• theoretical problems (may require basics of number theory or probability theory)• problems from the main textbook• short programs• literature surveysHomework (2)• optional assignmentsshort programs vs. analytical problems or HDL codes More time consuming Most time spent on debugging Relatively straightforward Typically less time consuming More thinking Little writingMidterm exam 1 3 hours multiple choice test + short problems open-books, open-notes practice exams available on the webTuesday, November 9thTentative date:Midterm Exam 2 take-home 24 hours literature search + analytical problemsSunday, December 12thTentative date:• 3-4 labs• based on the GMU educational software, public domain cryptographic programs & libraries, or evaluation versions of commercial products• done at home; software downloaded from the web• based on detailed instructions• grading based on written reports (answers to questions included in the instructions)LaboratoryTentative list of laboratory topics1. Properties of classical cryptosystems2. Properties of public key cryptosystems3. Properties of hash functions4. Secure e-mail: Pretty Good Privacy and S/MIME• depth, originality• based on additional literature• you can start in the point where former students ended• based on something you know and are interested in• software / hardware / analytical• teams of 1-3 students• may involve experiments • several project topics proposed by the instructor• you can propose your own topicProject (1)• two weeks to choose a topic and write the corresponding specification• regular meetings with the instructor• 3-4 oral progress reports based on Power Point slides• draft final presentation due at the last progress report Tuesday, December 7• written report/article, 15-page IEEE style due Saturday December 11• short conference-style oral presentations Tuesday, December 21• contest for the best presentation• publication of reports and viewgraphs on the webProject (2)• Project reports/articles requirements- IEEE style- 15 pages maximum- appendices possible but do not influence the evaluation- source codes made available to the instructor• Review of project reports- reviews done by your fellow students- reviews due Tuesday, December 14Project (3)Project TypesSoftwareprogram in a high-level language (C, C++, Java)or assembly languageHardwareRTL model in HDL(VHDL, Verilog)mapped into FPGA or ASIC,verified using timing simulationAnalyticalcomparative analysis of competing algorithms, protocols, or implementationssurvey of the marketFollow-up coursesCryptography and Computer Network Security ECE 646Secure Telecommunication SystemsECE 746Computer ArithmeticECE 645Cryptography and Computer Network SecuritySecure Telecommunication Systems• AES• Stream ciphers• Elliptic curve cryptosystems• Random number generators• Smart cards• Attacks against implementations (timing, power analysis)• Efficient and secure implementations of cryptography• Security in various kinds of networks (IPSec, wireless)• Zero-knowledge identification schemes• Historical ciphers• Classical encryption (DES, IDEA, RC5, AES)• Public key encryption (RSA, DH, DSA)• Hash functions and MACs • Digital signatures• Public key certificates• Secure Internet Protocols - e-mail: PGP and S-MIME - www: SSL• Cryptographic standardsModular integer arithmeticOperations in the Galois Fields GF(2n)“Typical” coursetimedifficultyThis coursedifficultytimeEducational software for a cryptographic laboratoryProject topics - SoftwarePrerequisites: C/C++Examples of tasks:• provide a choice of an underlying library - currently only Crypto++ - faster libraries available but more difficult to integrate• statistical tests for randomness of input, output, and intermediate results• turning an internal project into an open-source projectIdea: Develop extensions to the existing GMU educational software for teaching cryptography - KRYPTOSAshraf AbuSharekhMS Thesis, April 2004Comparative Analysis of SoftwareMulti-precision Arithmetic Librariesfor Public Key CryptographySupportHighSchemesLowPrimitivesLowCryptoPPPIOLOGIEOpenSSLMIRACLPerformanceGMP,NTL, LiDIACLNHighSupportHighSchemesLowPrimitivesLowCryptoPPPIOLOGIEOpenSSLMIRACLPerformanceGMP,NTL, LiDIACLNHighCAMERA v1.0CAMERA v1.0by Mike LyonsInstructor in the BS IT and MS TCOM programsDesign philosophy:Enable experiential learningby creating an interactive environment- learn by doingMake it visual- images reinforce concepts- color and movement are attractive, (especially to young students)User experience:•Based on a graphical user interface (GUI)- windows, draggable icons, mouse-driven- look-and-feel is


View Full Document

MASON ECE 646 - Cryptography and Computer Network Security

Documents in this Course
Load more
Download Cryptography and Computer Network Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Cryptography and Computer Network Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Cryptography and Computer Network Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?