Network Security. BITS Pilani Pilani Dubai Goa Hyderabad. Lecture-1, January 9, 2012 Rahul Banerjee, PhD (CSE)

Size: px
Start display at page:

Download "Network Security. BITS Pilani Pilani Dubai Goa Hyderabad. Lecture-1, January 9, 2012 Rahul Banerjee, PhD (CSE)"

Transcription

1 BITS Pilani Pilani Dubai Goa Hyderabad Network Security Lecture-1, January 9, 2012 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems Home:

2 Interaction Points About the focus of the course How shall this course be conducted? Resources & Timelines for the course What is Network Security? Elements involved in Network Security Select References to the literature Summary BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956

3 About the Focus of the Course This course aims at: Learning about the basics of Computer Networking Developing an ability to: Understand security requirements of a given network or internetwork, Conceptualizing a simple but effective solution to reasonably secure a given network or internetwork, Designing a verifiable network security system, Configure a simple network for ensuring required level of security, Analyze a given network security system s architecture / design & Selecting / developing software element required to secure a simple network / internetwork / service 11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 3

4 The Course Plan Methodology to be used: 42 Classroom lectures (three per week, as per the provided course handout) Learning Reinforcements through: Online Discussion Forum (at the LMS: hnp://nalanda.bits- pilani.ac.in/ ) Case- studies interlaced with design discussions (in classroom) Mini- project / TheoreQcal Study / Research Seminar / Laboratory Experiments: 25% Self- study assignments <for learning enhancement at appropriate points of Qme, no evaluaqon weightage> Only ONE Test: Mid- Semester Test <closed book> 30% Quizzes <Open Book / Open Notes> 5% Comprehensive ExaminaQon <Open Book: 20%, Closed Book: 20%> 30% <You are allowed to carry Laptops/Notebooks/Netbooks/Tablets/iPads etc. with wireless access disabled in classrooms as well as in open- book examinaqons and quizzes> 11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 4

5 Resources for the Course Course Home Page: URL: This page shall have the original slides <in PDF> developed by me Course Forum at the Nalanda LMS portal: URL: This page shall carry links to: Discussion Forum Reading advisories Challenges for bright students <meant for self-learning, no evaluation weightage> Occasional Links to News items of contemporary relevance to the topic under discussion Laboratory tips developed with the help of student volunteers Indicative Solutions to Test / Quiz / Compre. Exam papers IntraBITS Page for Course: <January 15, 2012 onward> 11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 5

6 AddiQonal Resources for the Course Digital Library resources: As accessible from the < including relevant online IEEE / ACM journals / magazines / standards & e-books as advised through Reading Advisories>> Access to select complete E-books via Books 24x7 Laboratory resources: Fixed and Mobile Networking equipment located at IBM Laboratory for Open Source Computing, Microsoft Laboratory for Mobile Computing and Chamber Consultation Hours: Monday: Hrs. 11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 6

7 Network Security: An IntroducQon Network Security Network Security is o^en viewed as the branch of study dealing with need to protect: one or more aspects of operaqon of Computer Networks; and, permined use (access, behaviour, performance, privacy and confidenqality), Security requirements of a Network may be Local or Global in their scope, depending upon the network s or internetwork s purpose of design and deployment. 11/01/12 (c) Dr. Rahul Banerjee, BITS Pilani, INDIA 7

8 AcQve versus Passive ANacks AcQve anacks involve ac.ve a0empts on security leading to modifica.on, redirec.on, blockage or destruc.on of data, devices or links. Examples: ModificaQon / corrupqon of data or access control bits Denial- of Service anacks Passive anacks involve simply gedng access to link or device and consequently data. (c) Rahul Banerjee, BITS, Pilani (India) 8

9 Role of Cryptography, OS & ConfiguraQon Role of Cryptography Symmetric / ConvenQonal cryptography Asymmetric cryptography Role of OperaQng Systems Built- in OS Security at the Kernel- level Support for Cryptographic APIs Network Protocol Stack design based security Role of ConfiguraQon in Security Network configuraqon OS configuraqon ApplicaQon configuraqon (c) Rahul Banerjee, BITS, Pilani Security System configuraqon 9 (India)

10 Symmetric- Key Cryptography Symmetric- Key cryptography is called so since in this class of cryptographic algorithms, encrypqon as well as decrypqon processes are performed using the same (i.e. symmetric) key. The algorithms / schemes / programs that use this paradigm are o^en termed as Symmetric- Key Ciphers / Private- Key Ciphers / Secret- Key Ciphers / ConvenQonal Ciphers etc. In such cases, Plaintext, EncrypQon- DecrypQon Algorithm, Key and Ciphertext form four basic components of the Symmetric Cipher Model. Such schemes should exhibit: Security of Key Distribu0on to the legal recipients) Adequate strength of Encryp0on (c) Rahul Banerjee, BITS, Pilani (India) 10

11 References Bruce Schneier: Applied Cryptography, Wiley Student EdiQon, Second EdiQon, Singapore, Alfred Menezes, Paul van Oorschot, and ScoN Vanstone: Handbook of Applied Cryptography. CRC Press, NY. William Stallings: Cryptography and Network Security. Fi^h EdiQon, Pearson, New Delhi, C.Kauffman, R.Perlman and M.Spenser: Network Security, Second EdiQon, PrenQce Hall, Englewood Cliffs, S.Bellovin and W.Chesvick: Internet Security and Firewalls, Second EdiQon, Addison- Wesley, Reading, (c) Rahul Banerjee, BITS, Pilani (India) 11

12 RecommendaQons for Further Reading Journals & Magazines IEEE / ACM TransacQons on Networking IEEE TransacQons on Wireless CommunicaQons IEEE TransacQons on Computers IEEE Security & Privacy IEE Proceedings on InformaQon Security IEEE Network IEEE Computer IEEE Pervasive CompuQng IEEE Personal CommunicaQons Elsevier s Pervasive CompuQng (c) Rahul Banerjee, BITS, Pilani (India) 12

13 RecommendaQons for Further Reading On- line Resources IETF PosQngs at ieo.org Periodic updates at nist.gov Select FIPS documents at fips.org Digital Libraries / Archives / Technical Reports at major research universiqes acqve in this area as shall be menqoned from Qme to Qme during lectures Rahul Banerjee: Lecture Notes on Network Security, Electronic Read- only ediqon to be available just before Mid- Sem Test at the course page (c) Rahul Banerjee, BITS, Pilani (India) 13

14 Thank you for your kind attention! BITS Pilani Pilani Dubai Goa Hyderabad Rahul Banerjee

Computer Networks. Lecture-1 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems

Computer Networks. Lecture-1 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems BITS Pilani Pilani Dubai Goa Hyderabad Computer Networks Lecture-1 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems E-mail: rahul@bits-pilani.ac.in Interaction

More information

CS F 303 COMPUTER NETWORKS JANUARY 11, 2017

CS F 303 COMPUTER NETWORKS JANUARY 11, 2017 1 P a g e o f 5 Birla Institute of Technology & Science, Pilani (Rajasthan) India Instruction Division Department of Computer Science & Information Systems Second Semester: 2016-2017 Course Handout: Part-II

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)

More information

Computer Networks. Lecture-5: Of Network Architectures, and Network Programming January 18, 2010

Computer Networks. Lecture-5: Of Network Architectures, and Network Programming January 18, 2010 Computer Networks -An Engineering Design Approach Lecture-5: Of Network Architectures, and Network Programming January 18, 2010 Rahul Banerjee, PhD (CSE) Networking & Distributed Systems Research Group

More information

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level

More information

Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard

Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard Dr Atul Gonsai #1, Naimish Kakkad *2, Bhargavi Goswami $3, Dr Nikesh Shah @4 # Department of MCA, Saurashtra University, @

More information

Netzwerksicherheit [NetSec]

Netzwerksicherheit [NetSec] Netzwerksicherheit [NetSec] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

COURSE DESCRIPTION. 3. Total estimated hours (hours per semester and didactic activities)

COURSE DESCRIPTION. 3. Total estimated hours (hours per semester and didactic activities) COURSE DESCRIPTION 1. Program Information 1.1 University Alexandru Ioan Cuza University of Iaşi 1. Faculty Faculty of Computer Science 1.3 Department Computer Science 1.4 Study Domain Computer Science

More information

An Introduc+on to Applied Cryptography. Chester Rebeiro IIT Madras

An Introduc+on to Applied Cryptography. Chester Rebeiro IIT Madras CR An Introduc+on to Applied Cryptography Chester Rebeiro IIT Madras CR 2 Connected and Stored Everything is connected! Everything is stored! Increased Security Breaches 81% more in 2015 CR h9p://www.pwc.co.uk/assets/pdf/2015-isbs-execugve-

More information

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li

More information

On successful completion of this course students should:

On successful completion of this course students should: CIT306 Computer Networks Course Name Computer Networks Course Code CIT 306 Course Type Area Elective Course Level Undergraduate AKTS Credit 5 ECTS Course hours per week 3 (Institutional) Practice hours

More information

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus First Semester 2017-2018 Instruction Division Course Handout (Part II) Date: 02/08/2017 In addition to Part I (General Handout for all courses appended to the Time Table), this portion gives further specific

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

Authentication Part IV NOTE: Part IV includes all of Part III!

Authentication Part IV NOTE: Part IV includes all of Part III! Authentication Part IV NOTE: Part IV includes all of Part III! ECE 3894 Hardware-Oriented Security and Trust Spring 2018 Assoc. Prof. Vincent John Mooney III Georgia Institute of Technology NOTE: THE FOLLOWING

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division. SECOND SEMESTER Course Handout Part II

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division. SECOND SEMESTER Course Handout Part II SECOND SEMESTER 2016-2017 Course Handout Part II In addition to part-i (General Handout for all courses appended to the time table) this portion gives further specific details regarding the course. Course

More information

A SIMPLIFIED IDEA ALGORITHM

A SIMPLIFIED IDEA ALGORITHM A SIMPLIFIED IDEA ALGORITHM NICK HOFFMAN Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions

More information

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec] Netzwerksicherheit [NetSec] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems http://www7.informatik.uni-erlangen.de/~dressler/ dressler@informatik.uni-erlangen.de Systemsicherheit [SysSec]

More information

SI - Computer Security

SI - Computer Security Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 701 - AC - Department of Computer Architecture Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator

More information

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline

University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline University of Asia Pacific (UAP) Department of Electrical and Electronics Engineering (EEE) Course Outline Program: Course Title: Electrical and Electronics Engineering (EEE) Computer Networks Course Code:

More information

3D (6 X 4 X 4) - Playfair Cipher

3D (6 X 4 X 4) - Playfair Cipher 3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital

More information

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division. SECOND SEMESTER Course Handout Part II

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division. SECOND SEMESTER Course Handout Part II SECOND SEMESTER 2014-2015 Course Handout Part II In addition to part-i (General Handout for all courses appended to the time table) this portion gives further specific details regarding the course. LEGENDS

More information

Faculty of Sciences and Information Technology

Faculty of Sciences and Information Technology Faculty of Sciences and Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Networks Sessional Course Code: CSE 448 Semester: Level: Spring-2018

More information

FIT5044 Network security. Unit Guide. Semester 1, 2010

FIT5044 Network security. Unit Guide. Semester 1, 2010 FIT5044 Network security Unit Guide Semester 1, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the elements contained

More information

Academic Course Description

Academic Course Description BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography

More information

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year

More information

CPS2323. Block Ciphers: The Data Encryption Standard (DES)

CPS2323. Block Ciphers: The Data Encryption Standard (DES) Block Ciphers: The Data Encryption Standard (DES) Content Block Ciphers: Constructing Pseudo Random Permutations using confusion/diffusion A call for an industry standard... and the NSA Lucifer and Feistel

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 Cryptography Dr. Michael Schneider michael.schneider@h-da.de October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 1 Formalities 2 Contents, Time Table 3 Literature 4 Announcements

More information

Diffie-Hellman Protocol as a Symmetric Cryptosystem

Diffie-Hellman Protocol as a Symmetric Cryptosystem IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 33 Diffie-Hellman Protocol as a Symmetric Cryptosystem Karel Burda, Brno University of Technology, Brno, Czech

More information

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to: Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students

More information

Cryptography And Network Security By William Stallings 5th Edition Solution Manual

Cryptography And Network Security By William Stallings 5th Edition Solution Manual Cryptography And Network Security By William Stallings 5th Edition Solution Manual We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by

More information

Presented by: Kevin Hieb May 2, 2005

Presented by: Kevin Hieb May 2, 2005 Presented by: Kevin Hieb May 2, 2005 Governments National Finances National Security Citizens Companies Data Loss Monetary Loss Individuals Identity Theft Data Loss Networks Firewalls Intrusion Detection

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Introduction. Ahmet Burak Can Hacettepe University. Information Security Introduction Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Information Security 1 Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman,

More information

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI PILANI CAMPUS Instruction Division

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI PILANI CAMPUS Instruction Division Second Semester 2017-2018 Course Handout (Part II) January08, 2017 In addition to part I (General Handout for all courses appended to the time table) this portion gives further specific details regarding

More information

LESSON PLAN. Sub Code & Name : CS2363 COMPUTER NETWORKS Unit: I Branch: EEE Semester :VI

LESSON PLAN. Sub Code & Name : CS2363 COMPUTER NETWORKS Unit: I Branch: EEE Semester :VI Unit: I Branch: EEE Semester :VI Page 1 of 6 Introduction to networks network architecture network performance Direct link networks encoding framing error detection transmission Ethernet Rings FDDI - Wireless

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Science and Engineering (CSE) Microprocessors Course Code: CSE 333 Semester:

More information

A Comparative Study of Public Key Cryptosystem based on ECC and RSA

A Comparative Study of Public Key Cryptosystem based on ECC and RSA A Comparative Study of Public Key Cryptosystem based on ECC and RSA Arun kumar *, Dr. S.S. Tyagi *, Manisha Rana **, Neha Aggarwal #, Pawan Bhadana # *Computer Science & Engineering ** Electronics & Communication

More information

Object Oriented Programming

Object Oriented Programming Object Oriented Programming Course Code: CS 212 Semester: 2 nd Credit Hours: 3+1 Prerequisite Codes: CS-110: Fundamentals of Computer Programming Instructor: Shamyl Bin Mansoor Class: BESE-5 AB Office:

More information

Academic Course Description

Academic Course Description BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication

More information

e-sign and TimeStamping

e-sign and TimeStamping e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:

More information

THE TEN COMANDMENTS OF ALGEBRA

THE TEN COMANDMENTS OF ALGEBRA THE TEN COMANDMENTS OF ALGEBRA 1) 2) 3) 4) 5) 6) Thou shall not forget thy pencil. Thou shall practice algebra daily. Thou shall take algebra notes daily. Thou shall participate in algebra activities.

More information

Computer Networks. Lecture-2 January 10, 2012 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems

Computer Networks. Lecture-2 January 10, 2012 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems BITS Pilani Pilani Dubai Goa Hyderabad Computer Networks Lecture-2 January 10, 2012 Rahul Banerjee, PhD (CSE) Professor, Department of Computer Science & Information Systems E-mail: rahul@bits-pilani.ac.in

More information

M. Tech. (Power Electronics and Power System) (Semester I) Course Plan for Each Week (Hrs)

M. Tech. (Power Electronics and Power System) (Semester I) Course Plan for Each Week (Hrs) No. 3 Advanced Power Electronics Computer Application in Power System Modelling and Analysis of Electrical Machines M. Tech. (Power Electronics and Power System) (Semester I) Plan for Each Week (Hrs) Credits

More information

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE)

University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) University of Asia Pacific (UAP) Department of Computer Science and Engineering (CSE) Course Outline Program: Course Title: Computer Science and Engineering (CSE) Object Oriented Programming I: Java Course

More information

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester B 2016/17 City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2016/17 Part I Course Overview Course Title: Information Security for ecommerce Course Code: CS5285 Course

More information

MLR Institute of Technology

MLR Institute of Technology MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course

More information

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library Administrative Details Introduction to Cryptography Lecture 1 Benny Pinkas Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web page:

More information

Introduction to Cryptography. Lecture 1

Introduction to Cryptography. Lecture 1 Introduction to Cryptography Lecture 1 Benny Pinkas page 1 1 Administrative Details Grade Exam 75% Homework 25% (might include programming) Office hours: Wednesday, 12-13. Email: benny@cs.haifa.ac.il Web

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen September 11, 2007 Pekka Jäppinen, Lappeenranta University of Technology: September 11, 2007 General Ti5318800 Secured Communications Lecturer: Pekka Jäppinen

More information

Course Name: Information and Computers Networks Security Course Code: IT423

Course Name: Information and Computers Networks Security Course Code: IT423 Course Name: Information and Computers Networks Security Course Code: IT423 I. Basic Course Information Major or minor element of program: Major Department offering the course:information Technology Department

More information

Security Protocols and Infrastructures

Security Protocols and Infrastructures Security Protocols and Infrastructures Dr. Michael Schneider michael.schneider@h-da.de October 9, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1 1 Formalities 2 Contents, Time Table 3 Literature

More information

CPSC 5157G Computer Networks

CPSC 5157G Computer Networks CPSC 5157G Computer Networks Instructor Dr. Jianhua Yang Center for Commerce and Technology 28 (706) 565 3520 e mail: yang_jianhua@colstate.edu website: http://csc.colstate.edu/yang/ Office Hours (Fall

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Course and Contact Information San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015 Instructor: Aikaterini Potika Office Location: MacQuarrie Hall 215

More information

SE 4472a: Information Security

SE 4472a: Information Security Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a: Information Security Course Outline 2014-15 Description: This course provides an introduction to the

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

ITT Technical Institute. SD2720 Advanced Software Development Using Java Onsite and Online Course SYLLABUS

ITT Technical Institute. SD2720 Advanced Software Development Using Java Onsite and Online Course SYLLABUS ITT Technical Institute SD2720 Advanced Software Development Using Java Onsite and Online Course SYLLABUS Credit hours: 3 Contact/Instructional hours: 40 (20 Theory Hours, 20 Lab Hours) Prerequisite(s)

More information

C - Cryptography

C - Cryptography Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).

More information

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A

More information

Model 4.2 Faculty member + student Course syllabus for Advanced programming language - CS313D

Model 4.2 Faculty member + student Course syllabus for Advanced programming language - CS313D Model 4.2 Faculty member + student Course syllabus for Advanced programming language - CS1D 1. Faculty member information: Name of faculty member responsible for the course Dr. Myriam Hadjouni Office Hours

More information

CPS2323. Symmetric Ciphers: Stream Ciphers

CPS2323. Symmetric Ciphers: Stream Ciphers Symmetric Ciphers: Stream Ciphers Content Stream and Block Ciphers True Random (Stream) Generators, Perfectly Secure Ciphers and the One Time Pad Cryptographically Strong Pseudo Random Generators: Practical

More information

C - Cryptography

C - Cryptography Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 749 - MAT - Department of Mathematics Academic year: Degree: 2018 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING (Syllabus 2010).

More information

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani Pilani Campus Instruction Division FIRST SEMESTER 2016-2017 COURSE HANDOUT (PART II) Date: 2 nd Aug 2017 In addition to Part I (General Handout for all courses appended to the timetable) this portion gives further specific details regarding

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

Module Syllabus. PHILADELPHIA UNIVERSITY Faculty: Information Technology Department: Applied Computer Science

Module Syllabus. PHILADELPHIA UNIVERSITY Faculty: Information Technology Department: Applied Computer Science Module Syllabus Module Name: Computer Skills (2) for Science Colleges Module Number: 710104 Level: 1 Credit Hours: 3 hours Prerequisite / Co-Requisite: none Lecturer Name: Office Number: Phone: E-mail:

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 -

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 - - 1-1 - 2-2 - 3 - DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY, AURAIMGABAD 4 Revised SYLLABUS B.Sc. Computer Maintenance (OPTIONAL) {Effective from 2016-2017 } B.Sc. Computer Maintenance (Optional) Course

More information

Instructor: Anna Miller

Instructor: Anna Miller Media Graphics ADV 3203 Fall 2016 Advertising Media Graphics - 81584 - ADV 3203 Mondays and Wednesdays 12:15 PM - 1:30 PM room 1011 And Advertising Media Graphics - 82354 - ADV 3203 Mondays and Wednesdays

More information

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box Efficient Implementation of Aes By Modifying S-Box Vijay L Hallappanavar 1, Basavaraj P Halagali 2, Veena V Desai 3 1 KLES s College of Engineering & Technology, Chikodi, Karnataka 2 V S M Institute of

More information

Syllabus CSCI 405 Operating Systems Fall 2018

Syllabus CSCI 405 Operating Systems Fall 2018 Syllabus CSCI 405 Operating Systems Fall 2018 1.0 General Information Class Time: Monday/Wednesday/Friday 11:00 AM - 11:50 AM Class Location: 317 Thompson Instructor: Dr. Deepti Joshi; Office: 224 Thompson;

More information

San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Spring 2018

San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Spring 2018 San José State University Department of Computer Science CS-144, Advanced C++ Programming, Section 1, Spring 2018 Course and Contact Information Instructor: Office Location: Telephone: Email: Office Hours:

More information

Data Communications & Computer Networks

Data Communications & Computer Networks Data Communications & Computer Networks ACOE312 Course Overview Fall 2008 1 Agenda Instructor & class details General comments Course objectives Students assessment Course outline Textbook(s) 1 Instructor

More information

ESET 369 Embedded Systems Software, Fall 2017

ESET 369 Embedded Systems Software, Fall 2017 ESET 369 Embedded Systems Software, Fall 2017 Syllabus Contact Information: Professor: Dr. Byul Hur Office: Fermier 008A Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu

More information

New Undergraduate Course Proposal Form

New Undergraduate Course Proposal Form New Undergraduate Course Proposal Form 1. Department and Contact Information Tracking Number Date & Time Submitted 790 2009-02-13 14:13:42 Department College Budget Account Number Computer Science & Engieering

More information

CSE Computer Security (Fall 2007)

CSE Computer Security (Fall 2007) CSE 543 - Computer Security (Fall 2007) Lecture 1 - Introduction Professor: Trent Jaeger URL: http://www.cse.psu.edu/~tjaeger/cse543-f07/ Some bedtime stories This course We are going to explore why these

More information

Cryptography V: Digital Signatures

Cryptography V: Digital Signatures Cryptography V: Digital Signatures Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 19th February 2009 Outline Basics Constructing signature schemes Security of

More information

ECE 646 Lecture 8. Modes of operation of block ciphers

ECE 646 Lecture 8. Modes of operation of block ciphers ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.

More information

Cryptography V: Digital Signatures

Cryptography V: Digital Signatures Cryptography V: Digital Signatures Computer Security Lecture 10 David Aspinall School of Informatics University of Edinburgh 10th February 2011 Outline Basics Constructing signature schemes Security of

More information

Modification Of Des Algorithm

Modification Of Des Algorithm ISSN: 2278 0211 (Online) Modification Of Des Algorithm CRS BHARDWAJ Modibada, Jabalpur (Mp), India Abstract : This research paper discusses the modification of DES algorithm, which is the science of data

More information

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010 FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the

More information

Journal of Computer Engineering & Technology (JCET) ISSN (Print), ISSN (Online), Volume 1, Issue 1, July-December (2013)

Journal of Computer Engineering & Technology (JCET) ISSN (Print), ISSN (Online), Volume 1, Issue 1, July-December (2013) JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) JCET I A E M E ISSN 2347-3908 (Print) ISSN 2347-3916 (Online) Volume 1, Issue 1, July-December (2013), pp.10-17 IAEME: http://www.iaeme.com/jcet.asp

More information

San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016

San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016 San José State University Department of Computer Science CS158B, Computer Network Management, Section 1, Fall 2016 Course and Contact Information Instructor: Alberto Gonzalez Prieto Office Location: MH

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE

DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE 25 October, 2017 DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE Document Filetype: PDF 417.33 KB 0 DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE Additional functions for working with CTLs can

More information

Oracle ASM Cluster File System (ACFS) 12c Release 2. Ricardo Gonzalez Acuna, Oracle ASM Cluster File System (ACFS) Product Management 31 st May 2017

Oracle ASM Cluster File System (ACFS) 12c Release 2. Ricardo Gonzalez Acuna, Oracle ASM Cluster File System (ACFS) Product Management 31 st May 2017 Oracle ASM Cluster File System (ACFS) 12c Release 2 Ricardo Gonzalez Acuna, Oracle ASM Cluster File System (ACFS) Product Management 31 st May 2017 Safe Harbor Statement The following is intended to outline

More information

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department:: 203-4 COURSE PLAN Regulation: R FACULTY DETAILS: Name of the Faculty:: Designation: Department:: ROSHAN KAVURI Associate Professor IT COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 202 Designation::

More information

EE6364 Advanced Data Networks

EE6364 Advanced Data Networks EE 6364 Advanced Data Networks Fall, 2014 Instructor: Dr. David C. Wang Office: Office-Hour: by appointment Mailbox: NH Room 549 E-mail: dwang@exchange.uta.edu Course web site: http://www-ee.uta.edu/online/wang

More information

Dual Encryption by Random Segmentation and Random Re-Arrangement (RSRA) using Two Dimensional Array

Dual Encryption by Random Segmentation and Random Re-Arrangement (RSRA) using Two Dimensional Array Dual Encryption by Random Segmentation and Random Re-Arrangement (RSRA) using Two Dimensional Array Er. Amit Kumar (Scholar), Dr. Jayant Shekhar (Professor), Subharti Institute of Technology and Engineering,

More information

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids

C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids C-DAX: A Cyber-Secure Data and Control Cloud for Power Grids http://www.cdax.eu C- DAX is funded by the European Union's Seventh Framework Programme (FP7- ICT- 2011-8) under grant agreement n 318708 Mario

More information

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool

G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Pasupula, Nandikotkur Road, Kurnool-518014 BRANCH: COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course

More information

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer  /blog Room No. Phone No. /  Name. FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 1 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) What is Computer Network? A group of

More information