CIS 4360 - Computer Security Fundamentals - Spring 2019

 

Tentative Schedule

                         

Class

Topic

Material

1

1. Motivation

Introduction to Computer Security Fundamentals in 60 minutes LINK.

2

1. Overview

Computer Security: threats, attacks, confidentiality, integrity , availability. LINK

3

2. Overview

Computer Security: authentication, access control. LINK

4

2. Classical encryption techniques

Symmetric ciphers, substitution, transposition, steganography LINK

5

3. Block ciphers

Block cipher design and principles LINK

6

3. Block ciphers

Block ciphers, Feistel LINK

7

4. Block ciphers

The Data Encryption Standard (DES) LINK

8

4. Basic Concepts in Number Theory

Modular arithmetic, Euclidean algorithm, groups, rings, finite fields LINK

9

5. Advanced Encryption Standard (AES)

AES structure, key expansion, substitute bytes, shiftrows, mixcolumns, addroundkey LINK

10

5. Block Cipher Operation

Multiple encryption, 3-DES, modes of operation of block ciphers, ECB, CBC, CFM, OFM, CTM, XTS-AES for storage devices LINK

11

6. Public Key Cryptography and RSA

Asymmetric ciphers, the Rivest-Shamir-Addleman (RSA) protocol LINK

12

6. Public Key Cryptography

Principles of Public Key Cryptosystems LINK

13

7. Pseudorandom Number Generators

Random Numbers, Unpredictability, True Random Numbers LINK LINK

14

7. Pseudorandom Number Generators

PRNG, BBS, Using Block Cipher modes LINK LINK

15

8. Stream Ciphers, RC4

Using Block cipher modes, RC4 LINK LINK

16

8. Other Public Key Cryptosystems

Other Public-key systems, Elliptic Curve Cryptography LINK

17

9. Other Public-key Cryptosystems

Cryptographic hash functions, digital signatures LINK

18

9. First Principles and Cyber Defense

Separation, isolation, encapsulation, least priviledge, layering, abstraction, data hiding, modularity, simplicity and minimization LINK

19

10. Revision and Midterm

Revision: classical encryption techniques, block ciphers, DES, AES, block cipher operations, Public Key Cryptography

20

10. Midterm

11. Spring Break (18-22 March)

21

12. Cyber Defense

Anomaly/Intrusion detection and identification, network security techniques, defense in depth. LINK

22

12. Cyber Defense

Defense in depth, trust relationships, distributed cloud, virtualization LINK

23

13. Wireless Technologies

Wireless technologies (CDMA200, LTE), Internet 802.11/b/g/n, Infrastructure components (fibre optic networks, evolved packet core, IPLMN) LINK

24

13. Cellular and Mobile Technologies

Overview of smart phone technologies and embedded operating systems (IOS, Android), Wireless technologies (GSM, WCDMA) LINK

25

14. Cellular and Mobile Technologies

Mobile protocols (SS7, RR, MM, CC) LINK

26

14. Cellular and Mobile Technologies

Logical channel descriptions (BCCH, SDCCH, RACH, AGCH), Registration procedures and encryption standards LINK

27

15. Cellular and Mobile Technologies

Mobile identifiers (IMSI, IMEI, MSISDN, ESN, Global Title, E.164) LINK

28

15. Cellular and Mobile Technologies

Mobile and location-based services, Revision LINK

16. Final exam week

 

 


 

Last edited by Mike Burmester, December 9, 2018