CPE 542 Cryptography &Network SecuritySummer
Term 2008 - 3 Credits
Jordan University of Science and
- Schedule and Classroom: Sun-Tue-Thru 1:15-2:15 PM. Class Room:
- In order to view or print the PDF files, you need Adobe
Acrobat Reader. Make sure that you install the most recent version
of Acrobat Reader in your computer, otherwise, you may not be able to
view or print the documents found on this site.
- Project Details are posted on the web
- Why should you care about this class? Read
(Published in IEEE Computer.)
- My office hours: Mon, Wed 9:45-11:15 AM,
Tue: 2:15-3:15 PM, or by appointment.
My office: E1 Level 3
- Our TA is Eng. Suliman Al-Basheer. His office hours are:
Sun, Mon, Tue 1:30-2:30 PM
Alice and Bob: Security's inseparable couple.
Please read chapter 1 from the text book.
- Overview and Chapter 2 slides are now posted.
is now posted on the web.
is now posted on the web.
First Exam details are posted now.
is now posted on the web.
- Check this AES Flash.
Sample Exam- Summer 2005 first exam
- Please if
you have any questions, about HW3, come to ask me in my office.
Please have a look to the summer 2005 projects to get idea of what you
are supposed to do.
The make up for the first exam for the excused students will be in
Thursday 24-11-05 from 3:15-4:15, ROOM: E2011.
HW5 is now posted
Sample Second Exam- Summer 2005 second exam
project report/presentation are extended to Friday 16/12 at 6:00 pm.
Please send it to
Please fill the EVALUATION
and put it in the envelope attached to the door of my
Check the certificate provided in the lab
Presentations: If your
name is shown below, please be prepared to present your work in 10-15
Mohammad Hajjat & Mohammad Abu Zetoon:
Implementation of DES, AES, RSA
Alaa Alzayadeen, MOhammad Abu Atmeh :
Security Enhanced Linux
- Required sections form the final material
:9.1, 9.2, 10.1, 10.2,10.3, 11.1, 11.2, 11.3, 11.4, 12.2,12.4, 13.1,
- The presentations required in the final
exam are: Firewalls, Network Security, Bluetooth, Viruses/Worms.
- Project Requirements
- The title and abstract are due the 4th week
Every body is required to submit a report
and prepare a 10-15 minutes presentation for the project.
- The report
and presentation due date will be in the last week of classes. Please send it to
- Summer 2005 Projects
Schedule and Lab Room: Sun, Wed: 2:15-5:15 PM., in
Our TA is Eng. Suliman
Al-Basheer. His office hours are: Sun, Tue, Thru : 10:00-11:00 AM
Lab 1 Slides
- First Exam: 11/7/2008 from 1:15-2:15 PM. Rooms: A2124,
A3129. Material: Chapter2, except
section 2.4. Chapter3, except Linear Attack.
- Second Exam: 27/7/2008 from
1:15-2:15 PM. Rooms: A2124, A3129. Material:
5.1, 5.2, 6.1, 6.2, 7.1, 7.2, 7.3, 7.4
HW1 - :
Search the web and find 6 major computer and/or network security
companies and identify a product from each company. Provide the
1. URL of the company website,
2. URL of the product website,
3. A brief description of the product (one paragraph in your own words).
Selected Solutions by Ghassan Rayyashi
HW2 - :
Please solve the following problems from Chapter 2:
HW3 - :
Please solve the following problems from Chapter 3:
- HW4- please solve the following problems from chapter
5 in the
text book-page 168: -- Submit using Moodle;
- HW5- :
please solve the following problems from chapter 6 in the text book:
-- Submit using Moodle;
All homework assignments are submitted by email to :
name your file as your last name followed by homework number, for
Also make sure that your name is printed within the homework file.
are not accepted
Week 1: Introduction and Basic Concepts:
Some Basic Number Theory
Weeks 2, 3: Chapter 2: Classical Encryption Techniques
Weeks 4, 5: Chapter 3: Block Cipher and DES Chapter 3
Weeks 6,7: Chapter 5: Advanced Encryption Standard (AES) Chapter 5 Federal Publication (AES)
Week 8: Chapter 6: Contemporary Symmetric Chiphers Chapter 6
Week 9: Chapter 7: Confidentiality Using Symmetric Encryption Chapter 7
Week 10:Chapter 9: Public Key Cryptography and RSA: Chapter 9
Week 11: Chapter 10: Key Management; Other Public Key Cryptosystems Chapter 10
Week 12: Chapter11: Message Authentication and Hash Functions
Week 13: Chapter12: Hash Algorithms
Chapter 12, SHA Federal Publication
Week 14: Chapter13:
ObjectivesIn this course, we study the theoretical and
practical aspects of network security. We start with a threat model, and
describe vulnerabilities of computer networks to attacks by adversaries
and hackers using a variety of techniques. We then study methods and
techniques to circumvent or defend against these attacks and to minimize
their damage. In this context, we study cryptographic techniques and
protocols, network security protocols, digital signatures and
authentication protocols, network security practice, and wireless
Catalog DescriptionSecurity attacks, mechanisms, and services.
Network security and access security models. Overview of secret-key and
public-key cryptography. Authentication protocols and key management.
Network security practice. Email security. IP security and web security.
Intrusion detection and prevention systems. Firewalls and virtual
private networks. Wireless network security.
- Introduction: Security attacks to information systems. Threat
model. Security services. Mechanisms for providing confidentiality,
authentication, integrity, nonrepudiation, and access control.
Cryptography in data and communication security.
- Secret-Key and Public-Key Cryptography: Cryptosystems and
cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4.
Modes of operation. Confidentiality using encryption. Key distribution.
Random number generation. Hashes and message digests. One-way functions.
Trapdoor one-way functions. Public-key cryptosystems. RSA,
Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
- Authentication: Overview of authentication systems.
Authentication of people. Security handshake pitfalls. Strong password
protocols. Digital signatures. One-way and mutual authentication
- Network Security Standards and Practice: Kerberos V4 and V5.
PKI (Public Key Infrastructure). Real-time communication security.
IPsec: SSL/TLS. Electronic mail security. S/MIME, and PGP (Pretty Good Privacy). Firewalls, Web security.
- Wireless Network Security: Wireless networking protocols and
security issues. 802.11 protocols, attacks, and countermeasures
The BookW. Stallings. Cryptography & Network Security,
Fourth Edition, Prentice Hall, 2005
More Information about the Book
- HW Assignments: 10 %
- Project: 10 %
- Lab 10 %
- First: 15 %
- Second: 15 %
- Final: 40 %
PrerequisitesThis class is open to undergraduate students in the last year.
Dr. Lo'ai A. Tawalbeh