**Instructor:** David (Bong Jun) Choi

**Lectures:** M, W 09:00 ~ 10:20, B204

**Office Hours:** M 13:00 ~ 14:30, T 13:00 ~ 14:30, or by appointment

**Contact:**

Tel: +82 (32) 626 1216

E-mail: bjchoi (at) sunykorea.ac.kr

Office: Academic Building 423

**Description:**

- Principles and practice of different areas of computer network security, including cryptography, cryptanalysis, public key infrastructure, application/transport layer security, and network attacks/defenses, will be covered.

**Objectives:**

- After completing the course, you will be able to (1) understand the principles and practices in different areas of computer network security, (2) identify the threats, vulnerabilities, and countermeasures of different network systems, and (3) implement secure network systems.

**Pre-requisites (Recommended):**

- Course: Undergraduate courses in networking and data communication
- Programming: C/C++ on Unix/Linux based systems
- Math: Basic calculus and probability/statistics

**Textbook:**:

- William Stallings, “Cryptography and Network Security: Principles and Practice (6th Edition),” Prentice Hall, 2013. (ISBN-10: 0133354695, ISBN-13: 978-0133354690)

**Other References:**

- Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, (2nd Edition),” Wiley, 1996.
- Reading list of materials (tutorials, papers, and standards) that you SHOULD read will be available on the course website.

**Grading:**

- Midterm Exam (mid-April): 30%
- Final Exam (June 14-21): 40%
- Project: 20%
- Assignments (4-6): 10%

**Topics:**

**Security Basics:**- History of Cryptography
- Theory of Secure Communication: Shannon theory, entropy, equivocation, redundancy, complexity theory
- Network and Systems: applications, points of attack, security issues
- Arithmetic Operations: modular arithmetic, Euclid’s GCD, primes, finite fields, Chinese remainder theorem, factoring

**Cryptographic Techniques:**- One-time pad, Kerckhoffs principle, block cipher, stream cipher, transposition cipher, Kasiski method, rotor machine, product cipher
- DES, IDEA, AES, MD5, SHA

**Cryptanalysis:**• Memory-time tradeoff, differential cryptanalysis, linear cryptanalysis- Hash function security
- Key management
- Random and pseudo-random generators
**Standards and Protocols:**- Symmetric Cryptography
- Public Key Cryptography: RSA, Diffie-Hellman, ElGamal, elliptic curve, zero knowledge, cryptanalysis of public key systems
- protocols and Applications: Threshold Schemes, Internet Security, Firewalls, WAP, and etc.
- Standards: P1363, FIPS, 140, Suite B, and etc.

**Implementations and Applications:**- Smart cards, wireless network security, WEP, WAP, 802.1x, copyright protection, watermarks, and etc.

**Advanced Cryptographic Techniques:**- Threshold schemes, secret sharing, blind signatures, and etc.