1 / 17

Course web page:

ECE 646 Cryptography and Computer Network Security. Course web page:. ECE web page  Courses  Course web pages  ECE 646. Kris Gaj. Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

Download Presentation

Course web page:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ECE 646 Cryptography and Computer Network Security Course web page: ECE web page  Courses  Course web pages  ECE 646

  2. Kris Gaj • Research and teaching interests: • cryptography • network security • computer arithmetic • FPGA & ASIC design and testing • Contact: • The Engineering Building, room 3225 • kgaj@gmu.edu Office hours:Wednesday, 6:00-7:00 PM Monday, 7:30-8:30 PM

  3. NETWORK AND SYSTEM SECURITY • Advisors: Kris Gaj, Jens-Peter Kaps • ECE 542 Computer Network Architectures and Protocols– S.-C. Chang, et al. • ECE 646 Cryptography and Computer Network Security– K. Gaj, J.-P. Kaps– lab, project • ECE 746 Advanced Applied Cryptography– K. Gaj, J.P. Kaps – lab, project: C/C++, VHDL, or analytical • ISA 656 Network Security– A. Stavrou • ECE 699 Cryptographic Engineering– J.-P. Kaps, K. Gaj

  4. ECE 646 Lecture Laboratory Project Homework 15 % Midterm exam 15 % Final Exam 25 % 10 % 35 % Specification - 5 % Results - 10 % Oral presentation - 10% Written report - 8% Review - 2%

  5. deapth

  6. Lecture • viewgraphs / whiteboard • viewgraphs available on the web • (please, extend with your notes) • books • 1 required (Stallings) • 1 optional (all chapters available on the book web page) • articles (CryptoBytes, RSA Data Security Conf., CHES, • CRYPTO, etc.) • web sites - Crypto Resources • standards, FAQs, surveys

  7. Homework • optional assignments short programs vs. analytical problems or HDL codes • More time consuming • Most time spent on debugging • Relatively straightforward • Typically less time consuming • More thinking • Little writing

  8. Midterm exam • 2 hours 30 minutes • multiple choice test + short problems • open-books, open-notes • practice exams available on the web • midterm exam review session - optional Tentative date: Wednesday, October 27th

  9. Final exam 2 hours 45 minutes Multiple choice + several problems Wednesday, December 15 7:30 – 10:15 PM

  10. Laboratory • labs based on three major software packages • CrypTool • GnuPG for Windows or GnuPG for Linux • MAGMA Computational Algebra System • done at home or in the ECE labs: • software downloaded from the web • based on detailed instructions • grading based on written reports (answers to • questions included in the instructions)

  11. Project (1) • original • useful • depth, originality • based on additional literature • you can start at the point where former students ended • based on something you know and are interested in • software or hardware • may involve experiments • teams of 1-3 students

  12. Project (2) • about three weeks to choose a topic and write • the corresponding specification • regular meetings with the instructor • a few oral progress reports based on Power Point slides • draft final presentation due at the last progress report • written report/article, IEEE style • due Wednesday December 1 • short conference-style oral presentations • Wednesday, December 8 • contest for the best presentation • publication of reports and viewgraphs on the web

  13. Project (3) • Project reports/articles requirements • - IEEE style • - 15 pages maximum • - appendices possible but do not influence • the evaluation • Review of project reports • reviews done by your fellow students • reviews due, Sunday, December 5, midnight • final version of the report due Tuesday, • December 7, midnight

  14. Project (4) • Project presentations (Wednesday, December 8, 7:30-10:00PM) • - conference style • - open to general public (in particular, • students from previous years), ECE seminar credit • - 10 minutes for the presentation + 5 minutes for Q&A • - time strictly enforced

  15. “Typical” course difficulty time This course difficulty time

  16. Follow-up courses Cryptography and Computer Network Security ECE 646 Digital System Design with VHDL ECE 545 Advanced Applied Cryptography ECE 746 Computer Arithmetic ECE 645 Cryptographic Engineering ECE 699

  17. Cryptography and Computer Network Security Advanced Applied Cryptography Operations in the Galois Fields GF(2n) Modular integer arithmetic • AES • Stream ciphers • Elliptic curve cryptosystems • Random number generators • Smart cards • Attacks against implementations • (timing, power, fault analysis) • Efficient and secure • implementations of cryptography • Security in various kinds of • networks (IPSec, wireless) • Zero-knowledge identification • schemes • Historical ciphers • Classical encryption • (DES, IDEA, RC5, AES) • Public key encryption • (RSA, DH, DSA) • Hash functions and MACs • Digital signatures • Public key certificates • Secure Internet Protocols • - e-mail: PGP and S-MIME • - www: SSL • Cryptographic standards

More Related