CEN 621 Cryptography and Network Security 2011-2012 Spring Term CEN 621 Cryptography and Network Security 2011-2012 Spring Term INTERNATIONAL BURCH UNIVERSITY.

Slides:



Advertisements
Similar presentations
1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao
Advertisements

Computer Science Department
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
SKR 5200 Advanced Network Security
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
現代密碼學 Contemporary Cryptography. 2 Course Information Instructor: 左瑞麟 (Raylin Tso) Office: 大仁樓
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Information Security Principles (ESGD4222)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
DEPARTMENT of COMPUTER SCIENCE and INFORMATION TECHNOLOGIES CEN 665
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
MTH 201 Discrete Mathematics Fall Term MTH 201 Discrete Mathematics Fall Term INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Welcome! CSI 4118: Computer Networks and Protocols (3,0,0) Professor: Dr. Robert L. Probert Office: SITE 5098 Phone: x6709
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
CEN 111 Introduction to Algorithms and Programming INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. Günay Karlı
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
MTH 204 NUMERICAL ANALYSIS Spring Term MTH 204 NUMERICAL ANALYSIS Spring Term DEPARTMENT of INFORMATION TECHNOLOGIES Assoc. Prof. Dr.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
CEN 137 Computer Literature and Skills INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. A. Turan Özcerit
Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: PQ809
Computer Security (CS4800)
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
INTERNATIONAL BURCH UNIVERSITY
Opracowanie językowe dr inż. J. Jarnicki
Chuck Frank Northern Kentucky University
Introduction to Information Security
Introduction to Information Security
Cryptography and Network Security
INTERNATIONAL BURCH UNIVERSITY
Public Key Infrastructure
Security in Network Communications
Introduction to the course
INTERNATIONAL BURCH UNIVERSITY
Chuck Frank Northern Kentucky University
CSCI284 Spring 2004 GWU Introduction CSCI284 Spring 2004 GWU
Introduction to Course
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
LAB 3: Digital Signature
Presentation transcript:

CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY DEPARTMENT of INFORMATION TECHNOLOGIES Dr. Abdülhamit Subaşı

Class Schedule: Tuesday 17:00-19:45 Class Schedule: Tuesday 17:00-19:45 Office Hour:Open Door Policy Office Hour:Open Door Policy

Course Objectives Introduce computer and network security concepts. Introduce confidentiality, integrity and availability Develop some general design decisions that should be made when constructing secure systems Present cryptography concepts.

1.William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Prentice Hall, Douglas Stinson, Cryptography: Theory and Practice, CRC Press, CRC Press LLC, D. Hook, Beginning Cryptography with Java, Wrox Press, J. B. Knudsen, Java Cryptography, First Ed., R. Helton and J. Helton, Java Security Solutions, Wiley Publishing, Inc., 2002 Textbooks

Brief Contents Introduction to Cryptography Classical Encryption Techniques Block Ciphers and the Data Encryption Standard Advanced Encryption Standard More on Symmetric Ciphers Confidentiality Using Symmetric Encryption Public-Key Cryptography and RSA Key Management; Other Public-Key Cryptosystems Message Authentication and Hash Functions Hash and MAC Algorithms Digital Signatures and Authentication Protocols Authentication Applications Electronic Mail Security IP Security Web Security Intruders Malicious Software Firewalls

Grading Subject Research 25% Paper Presentation 25% Final Examination 50%

Wireless Security Mobile security security PGP Database security authentication systemsBiometrics authentication systems Web security E-commerce security Digital Signature IP security VPN Security Bluetooth Security Watermarking and information hiding VoIP Security JAVA security.NET Security PHP security Wireshark NS2 SNORT OPNET Presentation