CPE 542 Cryptography &Network Security

Summer Term 2008 - 3 Credits
Jordan University of Science and Technology
http://www.just.edu.jo/~tawalbeh/cpe542.html

Announcements

  • Schedule and Classroom: Sun-Tue-Thru 1:15-2:15 PM. Class Room: A2124.
  • In order to view or print the PDF files, you need Adobe Acrobat Reader. Make sure that you install the most recent version of Acrobat Reader in your computer, otherwise, you may not be able to view or print the documents found on this site.
  • Project Details are posted on the web
  • Why should you care about this class? Read this article. (Published in IEEE Computer.)
  • My office hours: Mon, Wed 9:45-11:15 AM, Tue: 2:15-3:15 PM, or by appointment. My office: E1 Level 3
  • Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Mon, Tue 1:30-2:30 PM
  • Alice and Bob: Security's inseparable couple.

  • Please read chapter 1 from the text book.

  • Overview and Chapter 2 slides are now posted.
  • HW1 is now posted on the web.
  • HW2 is now posted on the web.
  • First Exam details are posted now.
  • HW3 is now posted on the web.
  • Check this AES Flash.
  • Sample Exam- Summer 2005 first exam
  • Please if you have any questions, about HW3, come to ask me in my office.
  • Please have a look to the summer 2005 projects to get idea of what you are supposed to do.
  • The make up for the first exam for the excused students will be in Thursday 24-11-05 from 3:15-4:15, ROOM: E2011.
  • HW5 is now posted
  • Sample Second  Exam- Summer 2005 second exam
  • The project report/presentation are extended to Friday 16/12 at 6:00 pm. Please send it to tawalbeh@just.edu.jo
  • Important: Please fill the EVALUATION  and put it in the envelope attached to the door of my office. Thanks
  • Check the certificate provided in the lab section.
  • Presentations:  If your name is shown below, please be prepared to present your work in 10-15 minutes.:

    • Mohammad Hajjat & Mohammad Abu Zetoon: Implementation of DES, AES, RSA 

    • Alaa Alzayadeen, MOhammad Abu Atmeh : Security Enhanced Linux

    For Thursday

    • Ola Amayri & Boran Altal: Secure Email.

    • Samir Ghishan & Ali Alomari: Secure Wireles Payment Protocol
    • Naser Saleh & Sabri Bagi: Security Holes in Microsoft Outlook
    • Ghassan Rayyashi & Mahmoud Alabed: Kerberos Authentication Protocol
    • Ahmad Shatnawi & Hazim Elne'washi : Image Steganopgraphy---Back up
  • Required sections form the final material :9.1, 9.2, 10.1, 10.2,10.3, 11.1, 11.2, 11.3, 11.4, 12.2,12.4, 13.1, 13.3
  • The presentations required in the final exam are: Firewalls, Network Security, Bluetooth, Viruses/Worms.

 

 


Grades

Grades


Project

  • Project Requirements
  • The title and abstract are due the 4th week
  • Every body is required to submit a report and prepare a 10-15 minutes presentation for the project.
  • The report and presentation due date will be in the last week of classes. Please send it to tawalbeh@just.edu.jo
  • Summer 2005 Projects

The Lab

  • Schedule and Lab Room: Sun, Wed: 2:15-5:15 PM., in  LAB1

  • Our TA is Eng. Suliman Al-Basheer. His office hours are: Sun, Tue, Thru : 10:00-11:00 AM

  • Lab 1 Slides

  • Certificate


 Exams

  • First Exam: 11/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: Chapter2, except section 2.4. Chapter3, except Linear Attack.
  • Second Exam: 27/7/2008 from 1:15-2:15 PM. Rooms: A2124, A3129. Material: 5.1, 5.2, 6.1, 6.2, 7.1, 7.2, 7.3, 7.4

Homework Assignments

  • HW1 - : Search the web and find 6 major computer and/or network security companies and identify a product from each company. Provide the following:

        1. URL of the company website,

         2. URL of the product website, 

        3. A brief description of the product (one paragraph in your own words).  

             Selected Solutions by Ghassan Rayyashi

  • HW2 - : Please solve the following problems from Chapter 2:
  • HW3 - : Please solve the following problems from Chapter 3:
  • HW4-  please solve the following problems from chapter 5 in the text book-page 168: --  Submit using  Moodle;
  • HW5- : please solve the following problems from chapter 6 in the text book:    --  Submit using  Moodle;

     

All homework assignments are submitted by email to : cpe542@yahoo.com. Please name your file as your last name followed by homework number, for example, tawalbeh-hw1.pdf.
Also make sure that your name is printed within the homework file. Late HWs are not accepted


Course Plan

Week 1: Introduction and Basic Concepts: Introduction  ; Some Basic Number Theory

Weeks 2, 3: Chapter 2: Classical Encryption Techniques Chapter 2

Weeks 4, 5: Chapter 3: Block Cipher and DES Chapter 3

Weeks 6,7:  Chapter 5: Advanced Encryption Standard (AES) Chapter 5 Federal Publication (AES) FIPS-197

Week 8:  Chapter 6: Contemporary Symmetric Chiphers Chapter 6

Week 9:  Chapter 7: Confidentiality Using Symmetric Encryption Chapter 7

Week 10:Chapter 9: Public Key Cryptography and RSA: Chapter 9

Week 11: Chapter 10: Key Management; Other Public Key Cryptosystems Chapter 10

Week 12: Chapter11: Message Authentication and Hash Functions Chapter 11

Week 13: Chapter12: Hash Algorithms Chapter 12, SHA Federal Publication FIPS 180-2

 Week 14: Chapter13: Digital Signatures Chapter 13


Objectives

In this course, we study the theoretical and practical aspects of network security. We start with a threat model, and describe vulnerabilities of computer networks to attacks by adversaries and hackers using a variety of techniques. We then study methods and techniques to circumvent or defend against these attacks and to minimize their damage. In this context, we study cryptographic techniques and protocols, network security protocols, digital signatures and authentication protocols, network security practice, and wireless network security.

Catalog Description

Security attacks, mechanisms, and services. Network security and access security models. Overview of secret-key and public-key cryptography. Authentication protocols and key management. Network security practice. Email security. IP security and web security. Intrusion detection and prevention systems. Firewalls and virtual private networks. Wireless network security.

Topics

  • Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for providing confidentiality, authentication, integrity, nonrepudiation, and access control. Cryptography in data and communication security.
  • Secret-Key and Public-Key Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4. Modes of operation. Confidentiality using encryption. Key distribution. Random number generation. Hashes and message digests. One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
  • Authentication: Overview of authentication systems. Authentication of people. Security handshake pitfalls. Strong password protocols. Digital signatures. One-way and mutual authentication protocols.
  • Network Security Standards and Practice: Kerberos V4 and V5. PKI (Public Key Infrastructure). Real-time communication security. IPsec:  SSL/TLS. Electronic mail security. S/MIME, and PGP (Pretty Good Privacy). Firewalls,  Web security.
  • Wireless Network Security: Wireless networking protocols and security issues. 802.11 protocols, attacks, and countermeasures

The Book

W. Stallings. Cryptography & Network Security, Fourth Edition, Prentice Hall, 2005

More Information about the Book

Grading Plan

  • HW Assignments: 10 %  
  • Project: 10 %
  • Lab 10 %
  • First: 15 %
  • Second: 15 %
  • Final: 40 %

Prerequisites

This class is open to undergraduate students in the last year.

Dr. Lo'ai A. Tawalbeh


                                                                          28 July 2008