University of Cincinnati Logo
 

20-CS-6053 - Network Security
Electrical Engineering & Computer Science

   
Learning Objectives
Crypto Algorithms
 
  1. Know what a secret key crypto-system is
  2. Know what a public key crypto-system is
  3. Know specific secret key algorithms: AES, DES, IDEA
  4. Know specific public key protocols: Diffie-Hellman, RSA
  5. Understand message digests (hashing) and how it is used in encryption
  6. Understand elliptic curve cryptography
Block Ciphers
 
  1. Explain what Electronic Code Book is
  2. Explain what Cipher Block Chaining is
  3. Explain what Output Feedback Block is
  4. Explain how to check the integrity of a message sent in the clear
  5. Explain how to check the integrity of an encrypted message
Stream Ciphers
 
  1. Explain what an unconditionally secure cipher is
  2. Explain how entropy is used in determining the value of cipher
  3. Know what a one-time pad is
  4. Explain what a synchronous stream cipher is
  5. Explain what a self-synchronizing stream cipher is
  6. Explain the role of linear feedback shift registers in stream ciphers
  7. Know some attacks on stream ciphers and some countermeasures
  8. Know the Berlekamp-Massey for finding the shortest linear feedback shift register for a given binary output sequence
  9. Know RC4 and its weaknesses
Authentication
 
  1. Understand zero-knowledge authentication
  2. Know how to use RSA signatures for authentication
  3. Know the Digital Signature Standard
  4. Know how message digests are used in authentication
  5. Understand vulnerabilities associated with authentication protocols
Cryptosystem Infrastructure
 
  1. Know what a Certification Authority and its affiliated components are
  2. Know what a Key Distribution Center and protocols for using one are
  3. Know what a public key infrastructure is
Systems for Authentication and Session Management
 
  1. Know what Kerberos is, and how to use it, what vulnerabilities it might have
  2. Know what IPSec/IKE is, the protocols it uses, and vulnerabilities
  3. Know what SSH is and how it works
  4. Know what SSL/TSL is and how it works
  5. Know about email system security
Extra Things
 
  1. Know some examples of side-channel attacks
  2. Know how to make mobile phones secure
  3. Know some mathematics as applied to cryptography (Chinese Remainder Theorem, Euler Totient Function, etc.)
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson