Computer and Network Security (CS 475)
Announcments
Lectures
Programs
Course Resources
Assignments and Solutions
Grading Policy
 Course Description
The key objective of this class is to provide a thorough understanding of technologies
and methodologies with which computer networks can be protected. Topics that are
covered include: Key Management Credentials, Steganography and Watermarking,
Networking Security (VPNs, Firewalls, Intrusion Detection) and System Security Policies.
 Course Objectives
 Understand basic cryptography theory, including some well known algorithms for symmetric and public key encryption, digital signatures, key management, etc.
 Understand how crypto can be used as an effective tools in providing assurances concerning privacy and integrity of information, nonrepudiation, etc.
 Understand the principles of computer and network security.
 Appreciate the issues involved in creating secure systems (robust software, security in depth, policy, attack mitigation, etc.)
 Audience

Undergraduate computer science, mathematics, engineering, interested in
computer and network security.
 Prerequisites

Operating Systems (CS 370) and Computer Networking (CS 472).

Some knowledge of linear algebra and statistics.

Instructor
 Jeremy Johnson (with guest lectures by Spiros Mancoridis and Bill Regli
Office: University Crossings 100
phone: (215) 8952669
email: jjohnson AT cs DOT drexel DOT edu
office hours: TR 23. Additional hours by appointment.
 Meeting Time
 TR 12:301:50 in University Crossings 153
 Course Announcemens, Questions, and Discussion

Please use BBvista (webct) for questions and discussions related to the course.
If you know the answer to someone's question, please feel free to jump in,
as long as well it is not an answer to a homework problem. Course announcements
will also be posted there.
 Textbook
 C. Pfleeger, Security in Computing, 3rd Ed. Upper Saddle River NJ: Prentice Hall, 2003.
 Maple version 11. Maple is available free of charge to Drexel
University students through a University site license. See
IRT Software. Course notes will be made available
as Maple worksheets. Additional resources will be made available
as needed.
Topics
 Elements of Cryptography (Chapters 2 and 10)
 Public Key Encryption
 Cryptographic standards and protocols
 Applications to network security
 Network security
 Program security
 Secure systems
Grading
 Homework assignments and labs (50%)
 Midterm (25%)
 Final Project (25%)
Assignments and exams will be returned on a regular basis to provide feedback
to students. All students must do their own work, unless explicitly stated otherwise.
Any violation of this will
result in a zero grade for the assignment. A second violation may lead to an
F for the course.
Resources
 Reference Books

 Web Pages
 Waterloo Maple
Go to BBvista for announcements
Lectures
This list is tentative and may be modified at the instructor's discretion.
 Week 1 (Introduction to Cryptography and Cryptanalysis  Chapter 2)
 Jan. 8, 2008 (Monoalphabetic Substitution Cyphers)

Jan. 10, 2008 (Polyalphabetic Substitution Cyphers)
 Week 2 (Introduction to Cryptography and Cryptanalysis  Chapter 2 and Maple Documentation)
 Jan. 15, 2008 (Modular Arithmetic and Affine Cyphers)

Jan. 17, 2008 (Linear Algebra and Hill Cyphers)
 Week 3 (Symmetric Key Encryption and DES Standard Chapter 2 and 10)

Jan. 22, 2008 (Data Encryption Standard)

Jan. 24, 2008 (Data Encryption Standard)
 Week 4 (Public Key Encryption  Chapter 2 and 10)

Jan. 29, 2008 (RSA Public Key Encryption)

Jan. 31, 2008 (RSA Public Key Encryption)
 Week 5 (Midterm)
 Feb. 5, 2008 (Review and Finish Labs)
 Feb. 7, 2008 (Midterm Exam)
 Week 6 (Network Security and Cryptographic Protocols)
 Feb. 12 2008 (Public Key Cryptography Systems  Signatures, Hash Functions, and Authentication Mechanisms)

Feb. 14 2003 (Key Exchange Methods  DiffieHellman)
 Week 7 (Network Security and Cryptographic Protocols)
 Feb. 19, 2008 (Applications  IPSEC and SSL/SSH/PGP)
 Feb. 21, 2008 (Security Tools Lab  OpenSSL CA Functions, RSA Key Generation, Ethereal/Wireshark)
 Week 8 (Malware)
 Feb. 26, 2008 (Types of Malware)
 Feb 28, 2008 (Case Studies)
 Week 9 (Software Security Vulnerability)
 March 4, 2008 (Types of Software Security Vulnerabilities)
 March 6, 2008 (Detecting and Avoiding Software Security Vulnerabilities)
 Week 10 (Software Security Lab)
 March 11, 2008 ()
 March 13, 2008 ()
Week 11 (Final Projects)
 Project List
Programs and Worksheets
Assignments
Solutions
Created: 3/24/01 (revised 5/22/01) by jjohnson AT cs DOT drexel DOT edu