Computer and Network Security (CS 475)
Assignments and Solutions
Week 11 (Final Projects)
- Course Description
The key objective of this class is to provide a thorough understanding of technologies
and methodologies with which computer networks can be protected. Topics that are
covered include: Key Management Credentials, Steganography and Watermarking,
Networking Security (VPNs, Firewalls, Intrusion Detection) and System Security Policies.
- Course Objectives
- Understand basic cryptography theory, including some well known algorithms for symmetric and public key encryption, digital signatures, key management, etc.
- Understand how crypto can be used as an effective tools in providing assurances concerning privacy and integrity of information, non-repudiation, etc.
- Understand the principles of computer and network security.
- Appreciate the issues involved in creating secure systems (robust software, security in depth, policy, attack mitigation, etc.)
Undergraduate computer science, mathematics, engineering, interested in
computer and network security.
Operating Systems (CS 370) and Computer Networking (CS 472).
Some knowledge of linear algebra and statistics.
- Jeremy Johnson (with guest lectures by Spiros Mancoridis and Bill Regli
Office: University Crossings 100
phone: (215) 895-2669
e-mail: jjohnson AT cs DOT drexel DOT edu
office hours: TR 2-3. Additional hours by appointment.
- Meeting Time
- TR 12:30-1:50 in University Crossings 153
- Course Announcemens, Questions, and Discussion
Please use BBvista (webct) for questions and discussions related to the course.
If you know the answer to someone's question, please feel free to jump in,
as long as well it is not an answer to a homework problem. Course announcements
will also be posted there.
- C. Pfleeger, Security in Computing, 3rd Ed. Upper Saddle River NJ: Prentice Hall, 2003.
- Maple version 11. Maple is available free of charge to Drexel
University students through a University site license. See
IRT Software. Course notes will be made available
as Maple worksheets. Additional resources will be made available
- Elements of Cryptography (Chapters 2 and 10)
- Public Key Encryption
- Cryptographic standards and protocols
- Applications to network security
- Network security
- Program security
- Secure systems
Assignments and exams will be returned on a regular basis to provide feedback
to students. All students must do their own work, unless explicitly stated otherwise.
Any violation of this will
result in a zero grade for the assignment. A second violation may lead to an
F for the course.
- Homework assignments and labs (50%)
- Midterm (25%)
- Final Project (25%)
- Reference Books
- Web Pages
- Waterloo Maple
Go to BBvista for announcements
This list is tentative and may be modified at the instructor's discretion.
- Week 1 (Introduction to Cryptography and Cryptanalysis - Chapter 2)
- Jan. 8, 2008 (Monoalphabetic Substitution Cyphers)
Jan. 10, 2008 (Polyalphabetic Substitution Cyphers)
- Week 2 (Introduction to Cryptography and Cryptanalysis - Chapter 2 and Maple Documentation)
- Jan. 15, 2008 (Modular Arithmetic and Affine Cyphers)
Jan. 17, 2008 (Linear Algebra and Hill Cyphers)
- Week 3 (Symmetric Key Encryption and DES Standard- Chapter 2 and 10)
Jan. 22, 2008 (Data Encryption Standard)
Jan. 24, 2008 (Data Encryption Standard)
- Week 4 (Public Key Encryption - Chapter 2 and 10)
Jan. 29, 2008 (RSA Public Key Encryption)
Jan. 31, 2008 (RSA Public Key Encryption)
- Week 5 (Midterm)
- Feb. 5, 2008 (Review and Finish Labs)
- Feb. 7, 2008 (Midterm Exam)
- Week 6 (Network Security and Cryptographic Protocols)
- Feb. 12 2008 (Public Key Cryptography Systems - Signatures, Hash Functions, and Authentication Mechanisms)
Feb. 14 2003 (Key Exchange Methods - Diffie-Hellman)
- Week 7 (Network Security and Cryptographic Protocols)
- Feb. 19, 2008 (Applications - IPSEC and SSL/SSH/PGP)
- Feb. 21, 2008 (Security Tools Lab - OpenSSL CA Functions, RSA Key Generation, Ethereal/Wireshark)
- Week 8 (Malware)
- Feb. 26, 2008 (Types of Malware)
- Feb 28, 2008 (Case Studies)
- Week 9 (Software Security Vulnerability)
- March 4, 2008 (Types of Software Security Vulnerabilities)
- March 6, 2008 (Detecting and Avoiding Software Security Vulnerabilities)
- Week 10 (Software Security Lab)
- March 11, 2008 ()
- March 13, 2008 ()
- Project List
Programs and Worksheets
Created: 3/24/01 (revised 5/22/01) by jjohnson AT cs DOT drexel DOT edu