Security and Authentication (Graduate)

2019 Spring

Lecturer: Sugwon Hong, Professor
Department of Computer Engineering
office: 5723
email: swhong@mju.ac.kr
tel: 6777

Hour and Classroom

- course hour: Tue 14:00-16:50
- classroom: 5401

Goals

The title of this course is somewhat misleading, since this course will not deal with only special topics of security and authentication. The goal of this course is to provide "comprehensive" understanding of network security to the students who already have basic knowledge of networking technologies and protocols, and/or may have taken the undergraduate-level computer/network security course. The depth of the course will be a little deeper than the undergraduate course, but the width of this course will be wider than the one you might have taken previously.

Contents

This course will cover the following four major themes, and other special topics.

  1. Crypto basics
  2. Authentication
  3. Security protocols
  4. Other current security topics

We will follow these topics using mainly the materials I will provide. And we will also select and use some other resourses to study the other topics.

Prerequisites

Basic knowledge of networking is highly recommended.

Testbook and lecture notes

I will prepare and post lecture notes on the home page. Sometimes I will use the powerpoints which are given by varisous authors as an aid to preparing lecture notes, and add some stuff if necessary. The following books are most frequently used for this lecture.

Understanding Cryptography, Christof Paar and Jan Pelzl, Springer
Information Security: Principles and Practice, 2nd ed., Mark Stamp, Wiley
Cryptograhy and Network Security: Principles and Practice, 7th ed., Willian Stallings, Pearson

Homeworks

Finishing each subject some homework problems will be given for helping you to review, exercise, and understand further the contents which we cover in the class. .

Presentation

During the course each student will given a chance to study and present a topic in the class. The topics and papers will be notified during the course. The students will be given at least two weeks to prepare for the presentation and will deliver the contents for about 20 minutes.

Course Outline

The following schedle is tentative, and will be subject to change if necessary.

week
textbook topics and lecture notes
lecture notes
homeworks
reading
1

Intro

[Intro.pdf]

   
2

Crypto Basics
- Symmetric key crypto

[intro to cyrpo]

[stream cipher]

[block cipher]

[hw1]  
3

- block cipher operation modes

Modulo Arithmatic

Public key crypto
- RSA

[opeation modes]

[modulo arithmatic]

[RSA]

[hw2]

 

4

- Discrete Logarithm Crypto

- Elliptic Curve Crypto

[DLP]

[ECC]

   
5

Digital Signatures
PKI

Crypto hash functions

[public key-DS]

[public key-PKI]

[hash function]

 

 

6

Integrity & Authentication(MAC)

Authenticated Encryption

[MAC]

[authenticated encryp]

[hw3]

 

7

Key Establishment

AES key wrap, Random number generatoin
and other issues

[kep establishment and others]

 

8

Midterm exam

[hw solutions]  
9

Security Protocol

Entity Authentication

[security protocol]

[entitity authentication protocol]

   
10

Identity and Access Management Architecture

Transport-layer Security(Web security)-SSL

[IAM architecture ]

[TLS]

[project1]

 

11

Wireless Network Security

Network-layer Security -IPSec

[wireless LAN security]

[IPsec]

   
12

IoT Security

[IAM supplement]

 

 

13

Cloud Security

 

   
14

Web Service Security

   
15

Blockchain

   

 

16
Final exam      

 

Grading

  1. homeworks 20%
  2. midterm exam 30%
  3. final exam 30%
  4. presentation 20%