課程目標 |
密碼學觀念, 資安觀念及協定, 網安協定, 防火牆實習 |
Objectives |
Cryptography concept, security protocol, attack, firewall practice |
成績評量方式 |
Homework 15% (You may collaborate when solving the homework, however when writing up the solutions you must do so on your own.) Project 20% (Presentation and/or paper required) Midterm exam 25% (Open book and notes) Final exam 30% (Open book and notes) Class participation 10% |
Grading |
Homework 15% (You may collaborate when solving the homework, however when writing up the solutions you must do so on your own.) Project 20% (Presentation and/or paper required) Midterm exam 25% (Open book and notes) Final exam 30% (Open book and notes) Class participation 10% |
教學內容 |
The objective of this course is to examine both the principles and practice of cryptography and computer network security. The course material is of use to computer and communication engineers who are interested in embedding security into an information system.
1. Introduction (Chapter 1) 2. Conventional encryption: classical techniques, modern techniques, algorithms, confidentiality using conventional encryption (Chapters 2—7) 3. Public-key encryption and hash functions: public-key cryptography, number theory, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols (Chapters 8—13) 4. Network security practice: authentication applications, electronic mail security, IP security, Web security, anonymous communications (Chapters 14—17) 5. Wireless network security 6. System security: intruders, viruses, and worms, firewalls (Chapters 18—20). |
Syllabus |
The objective of this course is to examine both the principles and practice of cryptography and computer network security. The course material is of use to computer and communication engineers who are interested in embedding security into an information system.
1. Introduction (Chapter 1) 2. Conventional encryption: classical techniques, modern techniques, algorithms, confidentiality using conventional encryption (Chapters 2—7) 3. Public-key encryption and hash functions: public-key cryptography, number theory, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols (Chapters 8—13) 4. Network security practice: authentication applications, electronic mail security, IP security, Web security, anonymous communications (Chapters 14—17) 5. Wireless network security 6. System security: intruders, viruses, and worms, firewalls (Chapters 18—20). |