CSC 5270 Computer Systms Security

Course Description

In this age of Internet computing, there is indeed no place or time at which security does not matter. Protecting vital data from various attacks is always an important part in data systems. This course covers basic topics in protecting information computer systems and data from various attacks. It covers crypo-algorithms, protocols and system design principles, as well as case study.

Prerequisites: CSC 4420 and CSC 5250, or the instructor's permission.

Course Learning Objectives

Administrative Information

Class Times : 1:00pm to 2:15pm, Mon.
Class Location: State Hall, 318
Instructor: Lihao Xu TA : Sumukhi Chandrashekar

Text Book

William Stallings, Cryptography and Network Security: Principles and Practice , 6th Edition, Pearson, 2014

Other References

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone , Handbook of Applied Cryptography , CRC Press, 4th Printing, 1999.

Bruce Schneier, Applied Cryptography , Second Edition, John Wiley & Sons, 1996.

Assignments and Evaluation

Homework Policy

The grade of this course will be based on all the homework assignments. There will be neither midterm nor final exam. There will be a final class report. The weight of homeworks in the final grade is about 40% to 50%, and the rest goes to the final project.

Collaboration in terms of discussions is generally allowed and encouraged in the homeworks. But you should write the final solutions, including programs, alone, and understand them fully. It is absolutely not allowed to copy other people's soltuions and programs.

Late homeworks lose 20% of their scores per day (except in cases of illness or emergency), and will not be accepted 3 days after the due date.

Course Content

Symmetric Key Cryptosystems

Asymmetric Key Cryptosystems
Authentication and Signature

Final Class Report Back to Course page.

Special Notes

All Rights Reserved, Lihao Xu, Fall 2017