Class
|
Topic
|
Material
|
1
|
1.
Motivation
|
Introduction to Computer Security Fundamentals in 60 minutes
LINK.
|
2
|
1. Overview
|
Computer Security: threats, attacks, confidentiality, integrity , availability. LINK
|
3
|
2. Overview
|
Computer Security: authentication, access control.
LINK
|
4
|
2. Classical encryption techniques
|
Symmetric ciphers, substitution, transposition, steganography LINK
|
5
|
3. Block ciphers
|
Block cipher design and principles LINK
|
6
|
3. Block ciphers
|
Block ciphers, Feistel LINK
|
7
|
4. Block ciphers
|
The Data Encryption Standard (DES) LINK
|
8
|
4. Basic Concepts in Number Theory
|
Modular arithmetic, Euclidean algorithm, groups, rings, finite fields LINK
|
9
|
5. Advanced Encryption
Standard (AES)
|
AES structure, key expansion, substitute bytes, shiftrows, mixcolumns, addroundkey
LINK
|
10
|
5. Block Cipher Operation
|
Multiple encryption, 3-DES, modes of operation of block ciphers,
ECB, CBC, CFM, OFM, CTM, XTS-AES for storage devices
LINK
|
11
|
6. Public Key Cryptography
and RSA
|
Asymmetric ciphers, the Rivest-Shamir-Addleman (RSA) protocol
LINK
|
12
|
6. Public Key Cryptography
|
Principles of Public Key Cryptosystems
LINK
|
13
|
7. Pseudorandom Number Generators
|
Random Numbers, Unpredictability, True Random Numbers
LINK
|
14
|
7. Pseudorandom Number Generators
|
PRNG, BBS, Using Block Cipher modes
LINK
|
15
|
8. Stream Ciphers, RC4
|
Using Block cipher modes, RC4
LINK
LINK
|
16
|
8. Other Public Key Cryptosystems
|
Other Public-key systems, Elliptic Curve Cryptography
LINK
|
17
|
11.
Other Public-key Cryptosystems
|
Cryptographic hash functions, digital signatures
LINK
|
18
|
9. First Principles and Cyber
Defense
|
Separation, isolation, encapsulation, least priviledge, layering, abstraction, data
hiding, modularity, simplicity and minimization
LINK
|
19
|
10. Revision and Midterm
|
Revision: classical encryption techniques, block ciphers, DES, AES, block cipher operations,
Public Key Cryptography
|
20
|
10. Midterm
|
|
|
11. Spring Break (15-19 March)
|
|
21
|
12. Message Authentication Codes
|
MACs based on hash functions HMAC, and on block ciphers CMAC, authenticated encryption
LINK
|
22
|
14. Key Management and
Distribution
|
Key Distribution Techniques, symmetric key distribution, distribution of public keys, X509
certificates.
LINK
|
23
|
15. Wireless Technologies
|
Wireless technologies (CDMA200, LTE), Internet 802.11/b/g/n,
Infrastructure components (fibre optic networks, evolved packet core, IPLMN)
LINK
|
24
|
15. Cellular and Mobile Technologies
|
Overview of smart phone technologies and embedded operating systems (IOS, Android), Wireless
technologies (GSM, WCDMA)
LINK
|
25
|
15. Cellular and Mobile Technologies
|
Mobile protocols (SS7, RR, MM, CC)
LINK
|
26
|
15. Cellular and Mobile Technologies
|
Logical channel descriptions (BCCH, SDCCH, RACH, AGCH), Registration procedures and
encryption standards
LINK
|
27
|
15. Cellular and Mobile Technologies
|
Mobile identifiers (IMSI, IMEI, MSISDN, ESN, Global Title, E.164)
LINK
|
28
|
15. Cellular and Mobile Technologies
|
Mobile and location-based services, Revision
LINK
|
|
16. Final exam week
|
|