CIS 4360 - Computer Security Fundamentals - Spring 2020

 

Tentative Schedule

                         

Class

Topic

Material

1

1. Motivation

Introduction to Computer Security Fundamentals in 60 minutes LINK.

2

1. Overview

Computer Security: threats, attacks, confidentiality, integrity , availability. LINK

3

2. Overview

Computer Security: authentication, access control. LINK

4

2. Classical encryption techniques

Symmetric ciphers, substitution, transposition, steganography LINK

5

3. Block ciphers

Block cipher design and principles LINK

6

3. Block ciphers

Block ciphers, Feistel LINK

7

4. Block ciphers

The Data Encryption Standard (DES) LINK

8

4. Basic Concepts in Number Theory

Modular arithmetic, Euclidean algorithm, groups, rings, finite fields LINK

9

5. Advanced Encryption Standard (AES)

AES structure, key expansion, substitute bytes, shiftrows, mixcolumns, addroundkey LINK

10

5. Block Cipher Operation

Multiple encryption, 3-DES, modes of operation of block ciphers, ECB, CBC, CFM, OFM, CTM, XTS-AES for storage devices LINK

11

6. Public Key Cryptography and RSA

Asymmetric ciphers, the Rivest-Shamir-Addleman (RSA) protocol LINK

12

6. Public Key Cryptography

Principles of Public Key Cryptosystems LINK

13

7. Pseudorandom Number Generators

Random Numbers, Unpredictability, True Random Numbers LINK

14

7. Pseudorandom Number Generators

PRNG, BBS, Using Block Cipher modes LINK

15

8. Stream Ciphers, RC4

Using Block cipher modes, RC4 LINK LINK

16

8. Other Public Key Cryptosystems

Other Public-key systems, Elliptic Curve Cryptography LINK

17

11. Other Public-key Cryptosystems

Cryptographic hash functions, digital signatures LINK

18

9. First Principles and Cyber Defense

Separation, isolation, encapsulation, least priviledge, layering, abstraction, data hiding, modularity, simplicity and minimization LINK

19

10. Revision and Midterm

Revision: classical encryption techniques, block ciphers, DES, AES, block cipher operations, Public Key Cryptography

20

10. Midterm

11. Spring Break (15-19 March)

21

12. Message Authentication Codes

MACs based on hash functions HMAC, and on block ciphers CMAC, authenticated encryption LINK

22

14. Key Management and Distribution

Key Distribution Techniques, symmetric key distribution, distribution of public keys, X509 certificates. LINK

23

15. Wireless Technologies

Wireless technologies (CDMA200, LTE), Internet 802.11/b/g/n, Infrastructure components (fibre optic networks, evolved packet core, IPLMN) LINK

24

15. Cellular and Mobile Technologies

Overview of smart phone technologies and embedded operating systems (IOS, Android), Wireless technologies (GSM, WCDMA) LINK

25

15. Cellular and Mobile Technologies

Mobile protocols (SS7, RR, MM, CC) LINK

26

15. Cellular and Mobile Technologies

Logical channel descriptions (BCCH, SDCCH, RACH, AGCH), Registration procedures and encryption standards LINK

27

15. Cellular and Mobile Technologies

Mobile identifiers (IMSI, IMEI, MSISDN, ESN, Global Title, E.164) LINK

28

15. Cellular and Mobile Technologies

Mobile and location-based services, Revision LINK

16. Final exam week

 

 


 

Last edited by Mike Burmester, April 27, 2020