CSE571S: Network Security (Fall 2014)

Instructor:Prof. Raj Jain, jain@wustl.edu

Office:Bryan 523

Office Hours: Wednesdays: 11:00AM-12:00PM
Wednesdays: 12:00noon-1:00PM

Teaching Assistant:YiJian Li, liyijiankaka at gmail.com (Office hours: Thursday/Sunday 1-2PM)

All question about the labs, homeworks and mid-term exams 1 and 2 grading should be directed to the teaching assistant.

Course Description:
A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private networks, authentication, authorization, accounting (AAA), WiFi security, Domain Name System security (DNSSEC), intrusion detection systems.

Prerequisites:CSE 473S (Introduction to Computer Networking) or equivalent.

Credits:3 Units.

Time:Wednesday-Wednesday 1:00PM-2:30PM

Textbook: William Stallings, "Cryptography and Network Security: Principles and Practice," 6th Edition, Prentice Hall, 2013, ISBN:0133354695. Please get the latest edition. Do not use older editions. If you use international edition, it should be dated 2013.

Audio/Video recordings of lectures from the last offering of this course are available: 2009 and 2011.

Tentative Schedule:

1Monday8/25/2014Course Introduction
2Wednesday8/27/2014Security Overview1
Classical Encryption Techniques2
Monday9/1/2014Holiday - Labor Day
3Wednesday9/3/2014Block Ciphers and DES3
4Monday9/8/2014Basic Concepts in Number Theory and Finite Fields4
5Wednesday9/10/2014Advanced Encryption Standard (AES)5
Block Cipher Operations (Part 1)6
6Monday9/15/2014Block Cipher Operations (Part 2)6
Pseudo Random Number Generation and Stream Ciphers (Part 1)7
7Wednesday9/17/2014Class Cancelled
8Monday9/22/2014Pseudo Random Number Generation and Stream Ciphers (Part 2)7
Number Theory8
9Wednesday9/24/2014Public Key Cryptography9
10Monday9/29/2014Exam 1
11Wednesday10/1/2014Project Guidelines (Part 1)
Other Public Key Cryptosystems (Part 1)10
12Monday10/6/2014Other Public Key Cryptosystems (Part 2)10
Cryptographic Hash Functions (Part 1)11
13Wednesday10/8/2014Cryptographic Hash Functions (Part 2)11
Message Authentication Codes (Part 1)12
14Monday10/13/2014Message Authentication Codes (Part 2)12
Digital Signatures (Part 1)13
15Wednesday10/15/2014Project Guidelines (Part 2)
Digital Signatures (Part 2)13
Key Management and Distribution (Part 1)14
16Monday10/20/2014Key Management and Distribution (Part 2)14
User Authentication Protocols (Part 1)15
17Wednesday10/22/2014User Authentication Protocols (Part 2)15
Network Access Control and Cloud Security (Part 1)16
18Monday10/27/2014Network Access Control and Cloud Security (Part 2)16
19Wednesday10/29/2014Transport Level Security 17
20Monday11/3/2014Exam 2
21Wednesday11/5/2014Wireless Network Security (Part 1)18
Project Guidelines (Part 3)
Project Review Form (right-click and save link as or save target as)
22Monday11/10/2014Wireless Network Security (Part 2)18
23Wednesday11/12/2014Electronic Mail Security (Part 1)19
24Monday11/17/2014Electronic Mail Security (Part 2)19
IP Security (Part 1)20
25Wednesday11/19/2014IP Security (Part 2)20
26Monday11/24/2014IP Security (Part 3)20
Intrusion Detection22
Wednesday11/26/2014Thanksgiving Break
27Monday12/1/2014Malicious Software21
28Wednesday12/3/2014Final Exam

Exams: 60%
Homeworks: 15%
Project: 20%
Class participation: 5%

Students Hands-on Projects:

Student Survey Papers:

Complete List of Audio and Video Recording of Lectures by Raj Jain
Back to Raj Jain's Home Page