Professor: Kwangjo Kim Credit/Hour: 3/3
TA : Byongcheon Lee : sultan@icu.ac.kr
1. Description
This course offers how to evaluate a
variety of vulnerabilities over the existing network and
how to construct security protocols
and their applications by using cryptoalgorithms,
digital signature and hash function
to guarantee integrity of information and authentication of network entities.
Moreover, every student can get
the knowledge on a typical network authentication protocol like Kerberos,
secure e-mailing system like PEM, X.400,
S/MIME and PGP, emerging network security protocol like IPSEC
and SET protocol and firewall
2. Hour : Tue. /Thu 16:30 ~ 18:00
3. Textbook
Week | Contents | Comment |
1st | Introduction & Security Requirement | TP Proposal |
2nd | Digital Signature and Hash Function |
HW#1 |
3rd | Basic Cryptographic Protocols | |
4th | Applied Cryptographic Protocols | TP Rep #1 |
5th | Authentication System | |
6th | Authentication Protocol | HW#2 |
7th | Kerberos |
TP Rep#2 / Presentation |
8th | Medterm Exam |
Written |
9th | E-mail Security (PGP) |
HW#3 |
10th | E-mail Security (S/MIME) | |
11th | IPSEC | HW#4 |
12th | Web Security | TP Rep #3 |
13th | Firewall | |
14th | TP Contest | |
15th | Final Exam |
Written |
(Note : Authorization required
to access this field.)