Prof. P. Honeyman
MF 9-10:30 (Section 7: Lecture)
W 9-10 (Section 8: Discussion)
This course introduces the principles and practices of cryptography,
network security, and secure software.
The first half of the lecture content covers basic cryptographic
methods, key distribution, and protocols for authenticated and
confidential communications. Topics include block and stream
ciphers, transposition, substitution, Feistel networks, DES, 3DES,
IDEA, Blowfish, CAST-128, Rijndael, feedback and chaining modes,
confidentiality, traffic analysis, key distribution, random number
generation, public key cryptography, RSA, public key certificates,
key distribution, Needham-Schroeder protocol, Diffie-Hellman key
exchange, one-way hash functions, message authentication codes,
weak and strong collision resistance, birthday attack, MD4, MD5,
SHA-1, HMAC, digital signatures, mutual authentication, and replay
The latter half of the lecture content addresses the practice of
network security. Topics include Kerberos, PGP, public key
infrastructures, SSL, and IP security.
The discussion sections focus on secure software. Topics include
risk management, open source vs. closed source, software auditing,
buffer overflow, and race conditions.
This course is intended for advanced undergraduate or first-year
graduate students. There will be weekly homework assignments,
occasional programming assignments, and a midterm and final exams.
Required textbooks (available at online bookstores)
Cryptography and Network Security: Principles and Practice, Third Edition
Please take care to purchase the Third Edition.
Building Secure Software: How to Avoid Security Problems the Right Way
John Viega and Gary McGraw
Supplementary textbooks (on reserve and available at online bookstores)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Cryptography: Theory and Practice, Second Edition
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone (Editor)
ISBN 0849385237 (free download available online)
Network Security: Private Communication in a Public World, Second Edition
Charlie Kaufman, Radia Perlman, Mike Speciner