Lec01_Introduction - Cryptography and Network Security Lecture 1 Introduction Prof Ren The art of war teaches us to rely not on the likelihood of

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Cryptography and Network Security Lecture 1: Introduction Prof. Ren  Prof. Ren 2 The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. 故用兵之法,無恃其不來,恃吾有以待 也﹔無恃其不攻,恃吾有所不可攻也。 The Art of War, Sun Tzu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2  Prof. Ren 3 Course Objective The purpose of this course is to provide an introduction of both the principles and practice of Cryptography, and Network security  Prof. Ren 4 Course Outline Introduction Symmetric Ciphers Conventional Ciphers Monoalphabetic Polyalphabetic Rotor Machines and Breaking the Enigma Block Cipher Design Principles Data Encryption Standard (DES) Differential Cryptanalysis Block Cipher Modes of Operations Advanced Encryption Standard (AES) Confidentiality using symmetric encryption
Background image of page 2
3  Prof. Ren 5 Course Outline Public-key encryption Public-key cryptography: RSA ElGamal Elliptic curve cryptography Digital signature and non-repudiation Message authentication and hash functions Key management  Prof. Ren 6 Course Outline Computer Networks and Internet What is Internet? Reference models: OSI vs. TCP/IP Hybrid Model Seven-layer Introduction
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4  Prof. Ren 7 Course Outline Network security practices Authentication applications Electronic mail security IP security Web security  Prof. Ren 8 Course Outline System security Intrusion detection system Firewalls
Background image of page 4
5  Prof. Ren 9 Course Outline Wireless Security Why is wirelesses communication different from wireline communication? CDMA security GSM security If time allows, we will also cover some advanced research topics. Background Information Security requirements have changed in recent times Traditionally provided by physical and administrative mechanisms Computer use requires automated tools to protect files and other stored information Use of networks and communications links require to protect data during transmission 10
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Definitions Computer Security - generic name for
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/27/2009 for the course ECE 816 taught by Professor Ren during the Spring '09 term at Michigan State University.

Page1 / 17

Lec01_Introduction - Cryptography and Network Security Lecture 1 Introduction Prof Ren The art of war teaches us to rely not on the likelihood of

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online