CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

Similar documents
CPSC 5157G Computer Networks

Course Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011

ESET 349 Microcontroller Architecture, Fall 2018

A: 90% - 100% B: 80% - <90% C: 70% - <80% D: 60% - <70% F: < 60% Important Dates:

CSC 111 Introduction to Computer Science (Section C)

Course Syllabus. Course Information

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

COLLEGE OF DUPAGE CIS 2542 Advanced C++ with Data Structure Applications Course Syllabus

ESET 369 Embedded Systems Software, Fall 2017

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.

San José State University Department of Computer Science CS166, Information Security, Section 1, Fall, 2018

Faculty of Science & Information Technology

TCOM 663/CFRS Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Fall, 2010

INF 315E Introduction to Databases School of Information Fall 2015

CS 200, Section 1, Programming I, Fall 2017 College of Arts & Sciences Syllabus

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

CPSC 2380 Data Structures and Algorithms

Introduction to Information Technology ITP 101x (4 Units)

IT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

ISM 324: Information Systems Security Spring 2014

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015

EECE.2160: ECE Application Programming Spring 2019

Network Fundamentals and Design Fall Semester 2014

CS 0449 Intro to Systems Software Fall Term: 2181

INFS 2150 (Section A) Fall 2018

Business Information System Analysis and Design Fall 2017

Web Programming Fall 2011

Meetings This class meets on Mondays from 6:20 PM to 9:05 PM in CIS Room 1034 (in class delivery of instruction).

Programming 1. Outline (111) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.

Programming 2. Outline (112) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.

CoSci 487 SYLLABUS Introduction to Networks

Division of Engineering, Computer Programming, and Technology

programming exercises.

South Portland, Maine Computer Information Security

CPS352 - DATABASE SYSTEMS. Professor: Russell C. Bjork Spring semester, Office: KOSC 242 x4377

CS 241 Data Organization using C

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

Syllabus Revised 08/21/17

Sul Ross State University. Spring CS 3310 Computer Communications. Office Location: ACR 109-B Office Phone:

ESET 369 Embedded Systems Software, Spring 2018

Computer Science Technology Department

CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007

Network Security

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description

San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016

Cleveland State University

CSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits

ITCC Cisco Exploration 1: Networking Fundamentals

EECE.2160: ECE Application Programming Spring 2017

Instructor: Anna Miller

Syllabus Course: MIS Foundation of Information Systems Fall Semester, Credit Hours

Syllabus CSCI 405 Operating Systems Fall 2018

Introduction to UNIX

When does RDBMS representation make sense When do other representations make sense. Prerequisites: CS 450/550 Database Concepts

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1

Sprint 2017, Sul Ross State University

Outline. Computer Science 331. Course Information. Assessment. Contact Information Assessment. Introduction to CPSC 331

Oklahoma State University Spears School of Business Department of Management Information Systems

Survey of Programming Languages Dr. R. M. Siegfried 407 Science (516) (not for homework submission)

CS157a Fall 2018 Sec3 Home Page/Syllabus

COURSE SYLLABUS Fall SAHE&T CSC 101 Introduction to Computers (CRN 3070) MAC Department Course No. Course Title

COURSE SYLLABUS AND INSTRUCTOR PLAN

Database Design and Management - BADM 352 Fall 2009 Syllabus and Schedule

MGMT 4336 Networks & Data Communication Section D10

COURSE SYLLABUS AND INSTRUCTOR PLAN CISCO DISCOVERY 4: Designing and Supporting Computer Networks ITCC David J. Burgett

Database Systems: Concepts, design, and implementation ISE 382 (3 Units)

Syllabus CS 430 Introduction to Computer Security Winter 2016

Big Sandy Community and Technical College. Course Syllabus

CPS352 Database Systems Syllabus Fall 2012

Computer Science Department CSC 1050 CRN Introduction to Unix and C Programming Fall Term 2016 Main Campus

WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

KOMAR UNIVERSITY OF SCIENCE AND TECHNOLOGY (KUST)

CHEM 31A (90285): General Chemistry Fall 2013

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

Course and Contact Information. Course Description. Course Objectives

Syllabus CS476 COMPUTER GRAPHICS Fall 2009

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX SYSTEM ADMINISTRATION CSIT 2411

FIT5044 Network security. Unit Guide. Semester 1, 2010

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

CISC 3130 Data Structures Fall 2018

Internet Web Technologies ITP 104 (2 Units)

Syllabus Revised 01/03/2018

CSci 4211: Data Communications and Computer Networks. Time: Monday and Wednesday 1 pm to 2:15 pm Location: Vincent Hall 16 Spring 2016, 3 Credits

Page 1 of 10. Instructor. Michael Robinson Office Hours: Available upon request. Description

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

ITSY Information Technology Security Course Syllabus Spring 2018

Syllabus Revised 03/05/2015

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS

Enterprise Network Design ITP 499 (3 Units)

Langara College Spring archived

Computer Science Technology Department

EE3315 Internet Technology EE3315 Internet Technology Overview Slide 1

Instructor: Eric Rettke Phone: (every few days)

CHEM 31A (90366): General Chemistry Fall 2011

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Transcription:

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li Yang Office: EMCS 314 A E-mail: Li-Yang@utc.edu Phone: 425-4392 Office Hours: M/T 8:30 am-12:00pm and W 9:00-11:00am ADA STATEMENT: Attention: If you are a student with a disability (e.g. physical, learning, psychiatric, vision, hearing, etc.) and think that you might need special assistance or a special accommodation in this class or any other class, call the Disability Resource Center (DRC) at 425-4006 or come by the office, 102 Frist Hall http://www.utc.edu/administration/disabilityresourcecenter/. If you find that personal problems, career indecision, study and time management difficulties, etc. are adversely affecting your successful progress at UTC, please contact the Counseling and Career Planning Center at 425-4438 or http://www.utc.edu/administration/counselingandcareerplanning/. Course Description The course covers the basic concepts of pattern recognition and biometrics, current major biometric technologies, and then analyzes specific case studies from technical, privacy, and social impact viewpoints. The course also offers a critical study of the cryptographic protocols used in many security applications including authentication, authorization, access control and digital commerce. Both commercial practices and federal government policies for classified information will be explored. Prerequisites CPSC 1110, CPSC 3600, and MATH 3030 with a grade of C or better and basic knowledge of information security. Purpose and Objectives The purpose of the course is to examine biometric and cryptographic technologies from the viewpoint of systems security administrator, integrator, purchaser, and evaluator. Both biometric and cryptographic systems are very important to the security of systems. So students must understand the fundamentals of these two technologies and be able to competently test and evaluate tools using these technologies, write technical reports on them, do research on them, and understand the process and need of establishing biometrics and cryptographic standards and using them. Course Requirements Regular class attendance. 1

Active class and laboratory participation in all discussions; this means spending some quality time reading and preparing for class and lab meetings and discussions One mid-term and a comprehensive final examination will be given. Examination make up will be on Reading Day. Individual extra credit assignments for the purpose of propping up a bad grade will not be given. Students will be required to sign a contract stating that they will not use knowledge acquired in this course for illegal or unethical purposes. This contract may be released to appropriate authorities should the student be suspected of illegal or unethical computer usage. Taking notes is encouraged. Each student will write a paper and make a technical presentation. Students have the freedom to select topics of interest on the condition that they are related to biometrics or cryptography. You can present your past work, technical reports from industry or selected papers from conferences and journals. You can search the ACM digital library or IEEE Explorer on UTC on-line library. You need to provide a page of abstract and a PowerPoint version of slides for the presentation. All the presentations must address the following questions. How is the problem to be solved? What is the author s solution(s)? How are the solutions to be evaluated? What are the strengths, compared with prior works? Do you think there is any weakness in the proposed work? * Students are encouraged to present at the ACM Mid-Southeast Conference (November). If your abstract is selected and you present your paper at the conference, you will have 5 points bonus on your final grade. Please go to the following link for more details of the ACM conference: http://www.utm.edu/staff/jclark/midsouth/ Grading Policy Grades will be based on the following: Undergraduate 40% Laboratory projects 20% Mid-term examination covering text material and content of class discussions. 30% Final comprehensive examination covering text material and content of class discussions 10% a term project that delivers a ppt presentation Grading Scale 90+ = A; 80-89 = B; 70-79 = C; 60-69 = D; below 60 = F 2

Primary Texts Behrouz A. Forouzan. Cryptography and Network Security, McGraw Hill, 2008, ISBN: 0-07-287022-2 Samir Nanavati, Michael Thieme, Raj Nanavati. Biometrics: Identity Verification in a Network World, Wiley, 2002, ISBN: 0-471-09945-7 Paul Reid. Biometrics for Network Security, Prentice Hall, 2004, ISBN 0-13-101549-4 References David Hook. Beginning Cryptography with Java, Wiley, 2005, ISBN: 0-7645-9633-0 Bill Ball. Linux in 24 hours, Sams. Free version of this book is available online. http://www.linux-books.us/linux_general_0009.php Paul Reid. Biometrics for Network Security. Prentice Hall, 2004, ISBN: 0-13-101549-4 John Chirillo, Scott Blaul. Implementing Biometric Security, Wiley, ISBN 0-7645-2502-6 Bruce Schneier, Applied Cryptography, Wiley, second edition, ISBN: 0-471-11709-9 IA resources Please check this link from the UTC InfoSec center for additional resources for your course work and paper: http://www.utc.edu/center-information-securityassurance/resources.php. Tentative Course Outline Week 1 Introduction to Cryptography Traditional Symmetric-key ciphers Week 2 Introduction to Modern Data Encryption Standard (DES) Symmetric-Key Ciphers Week 3 Advanced Encryption Standard (AES) Encipherment Using Modern Symmetric-Key Ciphers Week 4 Asymmetric-Key Cryptography Message Integrity and Message Authentication Week 5 Cryptography and Hash Cryptography and Hash Functions Functions Week 6 Digital Signature Digital Signature Week 7 Entity Authentication Midterm Week 8 Key Management Key Management Week 9 Security Protocols Security Protocols Week 10 Introduction to Biometric Fingerprint Biometrics Technologies Week 11 Face Biometrics and PCA, LDA Voice Biometrics and HMM model Week 12 Handwriting Analysis Iris Biometrics and DNA Week 13 Challenges, Law, and Ethics Presentation Week 14 Presentation Review 3

Course Website and Communication You can access lecture notes, assignments, and your grades through Blackboard system. The blackboard system is used to communicate with students. Students can use email to communication with the instructor during the week. Emails received after 10pm or during weekend may not be replied. This includes the night before exams. Makeup/Late Policy There will be no make-up tests. The final exam grade will replace an exam you miss. Failure to take the final exam will result in failing the course. All assignments are to be turned in on or before the assigned due date. You must demonstrate that your lab or assignment is working properly. To verify you must have your lab assignments signed by the instructor. A 25% penalty will be assessed for late assignments for the first week. No programming assignments will be accepted after the second late week and a grade of zero will be assigned for that assignment. Career Planning If you find that personal problems, career indecision, study and time management difficulties, etc. are adversely affecting your successful progress at UTC, please contact the Counseling and Career Planning Center at 425-4438. *UTC s Honor Code The UTC Student Handbook describes the Honor Code (pages 7-9), which includes the following examples of violations related to computer usage: (UTC Student Handbook page 7 paragraph B.2) 1. Making use of unauthorized assistance during an examination or in preparing a graded assignment 2. Plagiarism 3. Making unacknowledged use of another's computer program 4. Unauthorized use, or misuse, of the University's computing facilities such as: Logging on to an account without the knowledge and permission of the owner Changing, deleting, and adding to the programs, files and data without authorization of the owner Theft of program data and machine resources Attempts to thwart security of any computer system Attempts to disrupt the normal operations of any computer system In addition, I will not tolerate the use of cell phones in my class. If you have an emergency situation please let me know so accommodations can be made. Any suspected Honor Code violation in this course will be forwarded to the Honor Court for action, and an F will be assigned for the course grade. All graded work in this course is subject to the Honor Code, including examinations, programming exercises, and any written work prepared for the course. Important Dates 4

Class begins August 19 Last Day to Withdraw without a W September 1 Labor Day holiday September 2 Midterm grade notifications September 30-October 4 (Monday-Friday) Last Day to Withdraw October 20 with a W Fall Break October 21-22 Thanksgiving Holiday November 28-December 1 Last Day of Classes December 2 Final Exam December 4-9 5