======Information Security, Fall 2011====== The goal of this course is to acquaint the students with security issues in multi-user information systems and computer networks and to provide them with training in the fundamental techniques, particularly cryptography, for security and their applications in practical areas such as electronic commerce, network intrusion protection, and security management. ===== Announcements ===== * Feb. 04: Grade Report available. * Dec. 27: class will meet in front of 台大計中 at 1:30PM on Jan. 3, 2012. * Dec. 13: project descriptions: {{courses:is2011:termproject_tsay.pdf|Prof. Tsay}}, {{courses:is2011:termproject_lin.pdf|Prof. Lin}}, {{courses:is2011:termproject_lee.pdf|Prof. Lee}}, and [[courses:is2011:termproject_sun|Prof. Sun]]. * Dec. 13: {{courses:is2011:termproject.pdf|Term Project}} announced; proposal due on Dec. 27. * Nov. 02: {{courses:is2011:hw2.doc|HW#2}} due on Nov. 15. * Nov. 01: suggested solutions for {{courses:is2011:hw1a_s.pdf|HW#1A}} updated (several times; last at 8:40PM). * Nov. 01: suggested solutions for {{courses:is2011:hw1a_s.pdf|HW#1A}} and {{courses:is2011:hw1b_s.pdf|HW#1B}} available. * Nov. 01: slides for Key Management and Distribution available. * Oct. 12: slides for RSA and ECC available. * Oct. 04: {{courses:is2011:hw1b.pdf|HW#1B}} due on Oct. 18. * Oct. 03: slides for Multiple Ciphers and Modes of Operation and for Random Number Generation and Stream Ciphers available. * Sep. 27: {{courses:is2011:hw1a.pdf|HW#1A}} due on Oct. 4. * Sep. 27: slides for Finite Fields and for AES slightly revised. * Sep. 26: slides for AES available. * Sep. 20: slides for Block Ciphers and DES and for Finite Fields available. * Sep. 14: slides for Course Introduction and Overview and for Classical Encryption Techniques available. * Sep. 10: this website is the sole source of all up to date course information and syllabus; there will be no separate PDF version. =====Instructors===== [[http://www.im.ntu.edu.tw/~sunny/|Yeali S. Sun (孫雅麗)]], Room 909, Management II, 3366-1195, Xsunny@im.ntu.edu.twX (between the enclosing pair of X's)\\ [[http://newweb.management.ntu.edu.tw/chinese/im/teacher_detail.php?menu1=02&menu2=05&tid=9|Anthony J.T. Lee (李瑞庭)]], Room 705, Management II, 3366-1188, Xjtlee@im.ntu.edu.twX (between the enclosing pair of X's)\\ [[http://newweb.management.ntu.edu.tw/chinese/im/teacher_detail.php?menu1=02&menu2=05&tid=12|Yeong-Sung Lin (林永松)]], Room 808, Management II, 3366-1191, Xyslin@im.ntu.edu.twX (between the enclosing pair of X's)\\ [[http://im.ntu.edu.tw/~tsay/|Yih-Kuen Tsay (蔡益坤)]], Room 1108, Management II, 3366-1189, Xtsay@im.ntu.edu.twX (between the enclosing pair of X's) =====Lectures===== Tuesday 2:20~5:20PM, Room 205, College of Management, Building II =====TAs and Office Hours===== 蕭舜文 (for Prof. Sun), Xr93011@im.ntu.edu.twX (between the enclosing pair of X's)\\ 楊富丞 (for Prof. Lee), Xtitanic.7485.ok@gmail.comX (between the enclosing pair of X's)\\ 王猶順 (for Prof. Lin), Xcloudwalker.wang@gmail.comX (between the enclosing pair of X's)\\ 張暐獻 (for Prof. Tsay), Xb96705043@ntu.edu.twX (between the enclosing pair of X's) To make an appointment, please contact the TA or the instructor directly. =====Prerequisites===== Operating Systems and Computer Networks =====Textbook===== * //Cryptography and Network Security: Principles and Practices, 5th Edition,// W. Stallings, Prentice Hall, 2010. (Note: **be sure to check out the errata list on the [[http://williamstallings.com/Cryptography/|website]] of the book!**) * Supplementary readings. =====Syllabus/Schedule (with links to slides/notes)===== We will study the design and underlying principles of **automated tools for protecting information**, including software and data, //stored on computers or communicated over networks//. The main focus will be on the fundamentals and applications of **cryptographic technology**. We will follow mainly the textbook of W. Stallings and enhance the contents with class notes and supplementary readings. * Overview: basic concepts, architecture, model, etc. (.5 week: 09/13a) [slides: {{courses:is2011:Chapter0_Introduction.pdf|Course Introduction}}; {{courses:is2011:Chapter1_Overview.pdf|Overview}}] * Symmetric Cryptography: classical techniques, block ciphers, DES, finite fields, AES, pseudorandom number generation, stream ciphers, etc. (3.5 weeks: 09/13b, 09/20, 09/27, 10/04) [slides: {{courses:is2011:Chapter2_Classical.pdf|Classical Techniques}}, {{courses:is2011:Chapter3_DES.pdf|Block Ciphers and DES}}, {{courses:is2011:Chapter4_FiniteFields.pdf|Finite Fields}}, {{courses:is2011:Chapter5_AES.pdf|AES}}, {{courses:is2011:Chapter6_Modes.pdf|Multiple Ciphers and Modes of Operation}}, {{courses:is2011:Chapter7_Random.pdf|Random Number Generation and Stream Ciphers}}] * Public-Key (Asymmetric) Cryptography: number theory, RSA, ECC, etc. (3 weeks: 10/11, 10/18, 10/25) [slides: {{courses:is2011:RSA.ppt|RSA}}, {{courses:is2011:ECC.ppt|ECC}}] * Key Management and User Authentication (1 week: 11/01) [{{courses:is2011:Mutual_Trust.ppt|slides}}] * Midterm (2011/11/08) * Data Integrity Algorithms: hash algorithms, message authentication, and digital signatures (3 weeks: 11/22, 11/29, 12/06) [slides: {{courses:is2011:ch11.ppt|Cryptographic Hash Functions}}, {{courses:is2011:ch12.ppt|Message Authentication}}, {{courses:is2011:ch13.ppt|Digital Signatures}}] * Network Security: IPsec, virtual private networks (VPNs), IP traceback, firewalls, denial of service, etc. (3 weeks: 12/13, 12/20, 12/27) [ [[http://www.im.ntu.edu.tw/~sunny/courses_teaching.html|slides]] ] * Field Trip (2012/01/03) [{{courses:is2011:field_trip.pdf|schedule}}] * Final (2012/01/10) =====Web/FTP Site===== //http://www.im.ntu.edu.tw/~tsay/courses/is/ // or //ftp://140.112.106.6/ // (up to 106.10; must have an account at im.ntu.edu.tw for FTP; guest account available) =====Grading===== Homework 10%, Midterm 30%, Final 30%, Term Project 20%, Attendance/Participation 10%. =====References===== - //Cryptography and Network Security: Principles and Practices, 5th Edition//, W. Stallings, Prentice Hall, 2010. (Note: textbook of this course.) - //Introduction to Cryptography, 2nd Edition//, J.A. Buchmann, Springer, 2004. (Note: an introductory book self-contained with a succinct coverage of mathematical foundations.) - //Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition//, B. Schneier, John Wiley & Sons, 1996. (Note: a very comprehensive book on cryptography and its applications.) - //Security in Computing, 4th Edition//, C.P. Pfleeger and S.L. Pfleeger, Prentice Hall PTR, 2006. (Note: similar to [1] in scope and in technical depth. It covers fewer encryption algorithms, but is more comprehensive in system/program security. It also has chapters on data base security, security management, and legal and ethical issues.) - //Firewalls and Intranet Security: Repelling the Wily Hacker, 2nd Edition//, W.R. Cheswick, S.M. Bellovin, and A.D. Rubin, Addison-Wesley, 2003. - //Building and Managing Virtual Private Networks//, D. Kosiur, John Wiley & Sons, 1998. - //Building SET Application for Secure Transactions//, M.S. Merkow, J. Breithaupt, and K. Wheeler, John Wiley & Sons, 1998. - //Practical UNIX and Internet Security, 3rd Edition//, S. Gar nkel, G. Spa ord, and A. Schwartz, O'Reilly & Associates, 2003. - //Secure Programming with Static Analysis//, B. Chess and J. West, Addison-Wesley, 2007. - //Operating System Concepts, 8th Edition// (Chapters 14 and 15), A. Silberschatz, P.B. Galvin, and G. Gagne, Wiley, 2008. - //Computer Networks, 5th Edition// (Chapter 8), A.S. Tanenbaum, Prentice Hall, 2010. - //Distributed Systems: Concepts and Design, 5th Edition// (Chapter 7), G. Coulouris, J. Dollimore, and T. Kindberg, Addison-Wesley, 2011. - //[[http://catless.ncl.ac.uk/Risks/|The Risks Digest]]//, ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator. - //[[http://www.owasp.org/|The OWASP Website]]//. (Note: a website dedicated to Web application security.) ===== Old Exams ===== [Midterm 2006: {{courses:is:mid2006I.pdf|Part I}}] \\ [Midterm 2007: {{courses:is:mid2007I.pdf|Part I}}] \\ [Midterm 2008: {{courses:is:mid2008I.pdf|Part I}}] \\ [Midterm 2009: {{courses:is:mid2009I.pdf|Part I}}] \\ [Midterm 2010: {{courses:is:mid2010I.pdf|Part I}}]