VL Communication Network Security
Modul: | Communication Network Security (BINF-KT-CNS) |
Semester: | Sommersemester 2012 |
Art: | VL (2 SWS / 3 LP) |
LV-Nr.: | 0435 L 768 |
Veranstalter: | Albayrak, Camtepe |
Raum und Zeit: | Mo. 10 - 12, ab 23.04., TEL 1315 |
---
Diese Veranstaltung wird online mit ISIS durchgeführt Bitte melden Sie sich dort an!
This course will be in English / German!
---
Ihre Anmeldung ist zunächst unverbindlich.
Infos zur Anmeldung, zum Einloggen finden sich hier.
Course Details
This is a Bachelor degree lecture to introduce basic cryptographic methods and tools for securing communications networks. Class will cover topics from number theory and basic cryptography to communications protocol security. It is a hybrid course since it will have sufficient depth in theory as well as hands-on experience with the network protocols. After completion of this module students will have basic knowledge and experience in cryptographic methods and their theoretical background as well as in state of the art security problems and solutions for communications networks.
Language: English
Offered: Every Summer Semester
Trainer: Dr. Seyit Ahmet Camtepe
Office: TEL 1409 (Ernst-Reuter-Platz 7)
Office Hours: Wednesday 10:00AM – 12:00AM (Tentative)
Textbook: Following textbooks will be used in this class. Textbooks will be only the starting point for majority of topics that we will cover. The slides used will cover ideas from a broad range of sources including other books, papers, standard etc.
- Cryptography and Network Security, Ed. 4, by William Stallings
- Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson
- Cryptography Demystified, by John E. Hershey
- Malicious Cryptography - Exposing Cryptovirology, by A. L. Young & M.Yung
- Various Conference Papers, Journals, Standard Specifications and RFCs
Grading: Exam at the end of semester will form ~60% of the lecture grade. Remaining ~40% of the lecture grade will be decided from overall course participation and a few assignments.
Prerequisites: Students required to have basic understanding of Computer Communications Networks, basic understanding of Operating Systems, and knowledge of a programming language (Java, C, C++, Perl).
Assignments: There will be few assignments that can be completed with the materials covered in class.
A tentative outline of topics that will be covered in this lecture are as follows:
Week 1: (Monday, April 18, 2011)
Topics: Introduction (Attacks, Services, Mechanisms)
Materials: Chapter 1 (Cryptography and Network Security, Ed. 4, by William Stallings)
Week 2: (Monday, April 25, 2011) (Easter Monday - No Class)
Week 3: (Monday, May 2, 2011)
Topics: Classical Encryption and Cryptanalysis
Materials:
- Chapter 2 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 1 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 4: (Monday, May 9, 2011)
Topics: Theoretical Foundations: Shannon's Theory
Materials: Chapter 2 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 5: (Monday, May 16, 2011)
Topics: Block Ciphers: DES, 3DES, AES and Modes
Materials:
- Chapters 3 and 5 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 3 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 6: (Monday, May 23, 2011)
Topics: Stream Ciphers, PRNG, Key Management
Materials: Chapters 6 and 7 (Cryptography and Network Security, Ed. 4, by William Stallings)
Week 7: (Monday, May 30, 2011)
Topics: Cryptographic Hash Functions, Symmetric Cryptography Applications in Communications Networks (WLAN Security)
Materials:
- Chapter 12 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 4 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 8: (Monday, June 6, 2011)
Topics: Symmetric Cryptography Applications in Communications Networks (IPSEC, Kerberos)
Materials:
- Chapter 14 and 16 (Cryptography and Network Security, Ed. 4, by William Stallings)
Week 9: (Monday, June 13, 2011) (Pfingstmontag - No Class)
Week 10: (Monday, June 20, 2011)
Topics: Asymmetric Cryptography: RSA, PKC, Number Theory
Materials:
- Chapter 8 and 9 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapters 5 and 6 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
- Cryptography Demystified, by John E. Hershey
Week 11: (Monday, June 27, 2011)
Topics: Diffie-Hellman, ElGamal, Elliptic Curves, Digital Signature Standard
Materials:
- Chapter 10 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 6 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 12: (Monday, July 4, 2011)
Topics: Digital Signatures, Authnetication, Certificates, SSL, TLS, SET
Materials:
- Chapters 13, 14 and 17 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 9 and 12 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 13: (Monday, July 11, 2011)
Topics: PGP, S-MIME, ID-Based Cryptography
Materials:
- Chapters 15 (Cryptography and Network Security, Ed. 4, by William Stallings)
- Chapter 12 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
Week 14: (Monday, July 18, 2011)
Topics: ID-Based Cryptography, Secret Sharing, Malicious Cryptography
Materials:
- Chapter 13 (Cryptography: Theory and Practice, Ed. 3 by Douglas R. Stinson)
- Malicious Cryptography - Exposing Cryptovirology, by A. L. Young & M.Yung
Take-Home Exam: TBD
Copyright TU Berlin 2007