Skip to main content
CPE
453
Cryptography and Network Security
Introduction to the theory and practice of computer and network security. Fundamentals of secure networks and systems. Symmetric cryptography primitives, block ciphers and modes of operation. Introduction to number theory and its applications to public key cryptography algorithms. Authentication and integrity concepts, Hash functions, Message Authentication Codes and Digital Signatures. Key distribution and management. Real-life Networking protocols (IPSec, SSL, wireless networks). TCP-IP with a threat focus and attacks. Packet filtering, Firewall, and Intrusion Detection systems. Ethical issues.
Prerequisites:
0612300,0612356,0612357
0612453
(3-0-3)

Credits and Contact Hours

3 credits, 43 hours

Course Instructor Name

Prof. Anastasios Dimitriou and Dr. Ameer Mohammed

Textbook

Network Security Essentials: Applications and Standards, William Stallings, 5th Edition

Catalog Description

Introduction to the theory and practice of computer and network security. Fundamentals of secure networks and systems. Symmetric cryptography primitives, block ciphers and modes of operation. Introduction to number theory and its applications to public key cryptography algorithms. Authentication and integrity concepts, Hash functions, Message Authentication Codes and Digital Signatures. Key distribution and management. Real-life Networking protocols (IPSec, SSL, wireless networks). TCP-IP with a threat focus and attacks. Packet filtering, Firewall, and Intrusion Detection systems. Ethical issues.

Prerequisite

CpE-300, CpE-356, and CpE-357

Specific Goals for the Course

Upon successful completion of this course, students will be able to:

Identify and classify computer and security threats and develop a security model to prevent, detect and recover from attacks. (Student outcomes: 1)

Describe and analyze well-known signature generation and verification algorithms. (Student outcomes: 1, 2)

Describe and analyze existing authentication protocols for two party communications. (Student outcomes: 1, 2).

Analyze key agreement algorithms to identify their weaknesses. (Student outcomes: 1, 2)

Develop code to implement a cryptographic algorithm or write an analysis report on any existing security product. (Student outcomes: 1, 2, 3)

Understand the SSL or firewall based solution against security threats. (Student outcomes: 7)

Describe the ethical issues related to the misuse of computer security. (Student outcomes: 4)

Topics to Be Covered

Introduction and overview of cryptography

Basic cryptographic techniques (encryption and data integrity techniques in both the symmetric and public key setting)

Message integrity and Digital signatures

Kerberos authentication

Key distribution and management

Wireless/wired network security algorithms and protocols

Internet security algorithms and protocols

Network security threats and network security protection devices