CSE571S: Network Security (Fall 2011)

Instructor:Prof. Raj Jain, jain@wustl.edu

Office:Bryan 523

Office Hours: Mondays: 11:00AM-12:00PM
Wednesdays: 11:00AM-12:00PM

Teaching Assistant: Mart Haitjema, Bryan 422, Email: mah5@cec.wustl.edu, Office Hours: Friday 3:00-4:00PM

All question about the labs, homeworks and mid-term exams 1 and 2 grading should be directed to the teaching assistant.

Course Description:
A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private networks, authentication, authorization, accounting (AAA), WiFi security, Domain Name System security (DNSSEC), intrusion detection systems.

Prerequisites:CSE 473S (Introduction to Computer Networking) or equivalent.

Credits:3 Units.

Time:Monday-Wednesday 1:00PM-2:30PM

Textbook: William Stallings, "Cryptography and Network Security: Principles and Practice," 5th Edition, Prentice Hall, 2011, ISBN:0-13-609704-9. Please get the latest edition. Do not use older editions. If you use international edition, it should be dated 2011. It should have last page number 719. ISBN: 978-0-13-609704-9, or 0-13-609704-9

Audio/Video recordings of lectures from the last offering of this course are available on-line.

Tentative Schedule:

1Wednesday08/31/2011 Course Intro
2Monday09/05/2011Holiday - Labor Day
3Wednesday09/07/2011 Security Overview1
Classical Encryption Techniques2
4Monday09/12/2011 Block Ciphers and DES3
5Wednesday09/14/2011 Basic Concepts in Number Theory and Finite Fields4
6Monday09/19/2011 Advanced Encryption Standard (AES)5
Block Cipher Operations (Part 1)6
7Wednesday09/21/2011 Block Cipher Operations (Part 2)6
Pseudo Random Number Generation and Stream Ciphers7
Number Theory (Part 1)8
8Monday09/26/2011 Number Theory (Part 2)8
Public Key Cryptography (Part 1)9
9Wednesday09/28/2011 Public Key Cryptography (Part 2)9
Other Public Key Cryptosystems (Part 1)10
10Monday10/03/2011Exam 1
11Wednesday10/05/2011 Exam 1 Review
Other Public Key Cryptosystems (Part 2)10
12Monday10/10/2011 Cryptographic Hash Functions11
Project Guidelines (Part 1)
13Wednesday10/12/2011 Message Authentication Codes12
Digital Signatures (Part 1)13
14Monday10/17/2011 Digital Signatures (Part 2)13
Key Management and Distribution (Part 1)14
15Wednesday10/19/2011 Key Management and Distribution (Part 2)14
User Authentication Protocols (Part 1)15
16Monday10/24/2011 User Authentication Protocols (Part 2)15
Project Guidelines (Part 2)
17Wednesday10/26/2011 Transport Level Security (Part 1)16
18Monday10/31/2011 Transport Level Security (Part 2)16
Authentication, Authorization, Accounting (AAA)
19Wednesday11/02/2011 Wireless Network Security (Part 1)17
20Monday11/07/2011Exam 2
21Wednesday11/09/2011 Exam 2 Review
Wireless Network Security (Part 2)17
22Monday11/14/2011 Project Guidelines (Part 3)
Paper Review Form (right click and save link/target as)
23Wednesday11/16/2011 Wireless Network Security (Part 3)17
24Monday11/21/2011 Electronic Mail Security18
25Wednesday11/23/2011Holiday - Thanks Giving
26Monday11/28/2011 IP Security19
27Wednesday11/30/2011 Intrusion Detection20
28Monday12/05/2011 No Class
29Wednesday12/07/2011Final Exam

Exams: 60%
Homeworks: 15%
Project: 20%
Class participation: 5%

Students Hands-on Projects:

Student Survey Papers:

Complete List of Audio and Video Recording of Lectures by Raj Jain
Back to Raj Jain's Home Page