This is an upper-level undergraduate, first-year graduate course on computer and network security. This course introduces the principles and practices of cryptography, network security, and secure software. It will cover security policies, models, and mechanisms for secrecy, integrity, and availability; basic cryptography and its applications; secret key cryptography; hash functions; basic number theory and public key cryptography; trusted intermediaries, and network security (firewalls, IDS, IPsec, and SSL) etc.
Class Time: TR 11:00am - 12:20pm
Class Location: Washington Hall 301
Instructor: Dr. Kun Sun
Email: ksun@wm.edu
Office Hours: TR 1:30pm - 3:30pm, M-S Hall, #105
TA: Shengye Wan
Email: swan@email.wm.edu
Office Hours: by appointment, M-S Hall, #107A
Term project
|
Each student is required to complete a mid-size project, which includes proposal, implementation, and final demo or paper. Each student must finish the project by himself/herself. Requirements for project proposal. Projects include but are not limited to:
|
---|
Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World (2nd Edition),
Prentice Hall, ISBN-13: 007-6092018469, ISBN-10: 0130460192
Class Schedule (tentative)
Note: the schedule will change as the course progresses. Please check frequently.
Date |
Topic |
Reading Assignment |
Homework Assignment |
Handouts |
---|---|---|---|---|
01/21/2016 |
Topic 1. Introduction and Basic Security Concepts |
Chapter 1 |
||
01/26/2016 |
Topic 2. Basic Cryptography |
Chapter 2 |
||
01/28/2016 |
Topic 3.1 Secret Key Cryptography -- Algorithms |
Chapter 3.1 - 3.3, 3.5 |
||
02/02/2016 |
Topic 3.1 (Cont'd) |
Chapter 4.1 - 4.2 |
||
02/04/2016 |
Topic 3.3-4 Secret Key Cryptography -- Triple DES, MAC | Chapter 4.3- 4.4 |
HW1 (due by 2/25/2016) |
|
02/09/2016 |
Topic 4. Message Digest |
Chapter 5.1 - 5.2, 5.5 |
||
02/11/2016 |
Topic 4 (Cont'd) |
Chapter 5.6 - 5.7 |
||
02/16/2016 |
Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography |
Chapter 6.1 - 6.2, 7.1 - 7.4 |
HW2 (due by 03/03/2016) |
|
02/18/2016 |
Topic 5.1 (Cont'd) | Chapter 7.6 - 7.8 |
||
02/23/2016 |
Topic 5.2 Public Key Cryptography |
Chapter 6.3 - 6.4 |
||
02/25/2016 |
Topic 5.2 (Cont'd) |
Chapter 6.5 - 6.6 Chapters 9, 10 & 12 |
HW3 (due by 03/15/2016) |
|
03/01/2016 |
Topic 6.1 (Cont'd) Topic 6.2 Design and Analysis of Authentication Protocols |
Chapter 11.1-11.3 |
||
03/03/2016 |
Topic 6.2 (Cont'd) |
Chapters 11.4-11.8 |
||
03/08/2016 |
No Class (Spring Break) |
|||
03/10/2016 |
No Class (Spring Break) |
|||
03/15/2016 |
Mid-term Exam |
|||
03/17/2016 |
Topic 6.2 (Cont'd) Topic 7.1 Kerberos |
Chapters13 & 14 |
||
03/22/2016 |
No Class. (Instructor is out of town.) | |||
03/24/2016 |
No Class. (Instructor is out of town.) | Project proposal due | ||
03/29/2016 |
Mid-term Review |
|||
03/31/2016 |
Topic 7.2 PKI |
Chapter 15 |
HW4 (due by 04/14/2016) |
|
04/05/2016 |
Topic 8.1 IPsec: AH and ESP |
Chapters 16 and 17 |
||
04/07/2016 |
Topic 8.2 IPsec: IKE |
Chapter 18 |
||
04/12/2016 |
Topic 8.2 (Cont'd) |
|||
04/14/2016 |
No Class. (Instructor is out of town.) | HW5 (due by 04/28/2016) |
||
04/19/2016 |
Topic 8.3 SSL/TLS |
Chapter 19 |
||
04/21/2016 |
Topic 8.4 Firewalls and IDS |
Chapter 23 |
||
04/26/2016 |
Topic 8.5 Malicious Software | |||
04/28/2016 |
Final Preview |
Project final report due 05/10/2016 |
||
05/11/2016 |
Final Exam (2:00pm - 5:00pm), Wednesday |
Students are required to follow William and Mary's Honor System, as described in the student handbook.
Any student with a disability needing academic adjustments or accommodations should contact the instructor immediately.
This course includes materials provided by Dr. Peng Ning (North Carolina State University) and Dr. Haining Wang (University of Delaware).