Fall 2010 -Wednesday 7:10-9:50pm
Eng & CS 3316
Hussein M.
Abdel-Wahab, Ph.D.
e-mail: wahab@cs.odu.edu
office phone: (757) 683-4512
office hours: T & W 10:30 am – 1:30 pm
office location: 3315 Engineering &
Computational Sciences Bldg
Required text:
Network
Security: Private Communications in a Public World, 2nd edition, 2002, C. Kaufman, R. Perlman, and M. Speciner, Prentice-Hall.
Supplementary texts:
Network Security with OpenSSL, 2002,
J. Viega, M. Messier, and P. Chandra, O'Reilly & Associates.
Cryptography
Engineering, 2010, Niels Ferguson, Bruce Schneier,
and Tadayoshi Kohno, John Wiley & Sons.
Historical Perspective and Enjoyable to read:
The
Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2000, J. Simon Singh, Anchor Books,
A devision of Random House, Inc.
CRYPTOGRAPHY.
Introduction to Cryptography.
Secret Key Cryptography.
Hashes and Message Digests.
Public Key Algorithms.
Number Theory.
AUTHENTICATION.
Overview of Authentication Systems
Security Handshake Pitfalls.
Strong Password Protocols.
STANDARDS.
Kerberos
PKI (Public Key Infrastructure).
Real-time Communication Security.
IPsec: AH, ESP and IKE.
SSL/TLS.
ELECTRONIC MAIL.
Electronic Mail Security.
PEM & S/MIME.
PGP (Pretty Good Privacy).
OPEN SSL
Command-Line Interface
SSL/TLS Programming
Symmetric Cryptography
Hashes and MACs
Public Key Algorithms
GRADING