CSC 5270 Computer Systems Security

Course Description

In this age of Internet computing, there is indeed no place or time at which security does not matter. Protecting vital data from various attacks is always an important part in data systems. This course covers basic topics in protecting computer systems and information data from various attacks. It covers crypo-algorithms, protocols and system design principles, as well as case study.

Prerequisites: CSC 4420 and CSC 5250, or the instructor's permission.

For those students who are interested in taking this course, you are welcome to take a look at the course syllabus .


Text Book

William Stallings, Cryptography and Network Security: Principles and Practice , 6th Edition, Pearson, 2014

Other References

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone , Handbook of Applied Cryptography , CRC Press, 4th Printing, 1999.

Bruce Schneier, Applied Cryptography , Second Edition, John Wiley & Sons, 1996.


Lecture Notes , Homeworks and Announcements


Administrative Information

Instructor: Lihao Xu TA : Sumukhi Chandrashekar

Homework Policy

The grade of this course will be based on all the homework assignments, one every two to three weeks. There will be neither midterm nor final exam. There will be a final class report.

Collaboration in terms of discussions is generally allowed and encouraged in the homeworks. But you should write the final solutions, including programs, alone, and understand them fully. It is absolutely not allowed to copy other people's soltuions and programs.

Late homeworks lose 20% of their scores per day (except in cases of illness or emergency), and will not be accepted 3 days after the due date.


Lihao Xu, Fall 2017