Click here to download a syllabus file. It
includes a course description, references, grading procedure, and course
schedule.
Instructor: Prof. Kwangjo Kim (Instructor's webpage)
Teaching Assistant: Jangseong Kim(jskim.withkals AT kaist.ac.kr)
Objective:
This couse discusses the latest issues on cyber security beginning with the introduction of basic cryptography to understand how to design authentication primitives covering multi-party cryptographic protocols and core security components for network security, etc. Special presentations on DDoS defenses and secure smart grid are scheduled. The enrolled student must read and present the recommended papers and practice your term project under the guidance of your professor and TA.
Grading Policy:
Midterm Exam (15%), Quiz (5%), Final Exam (15%), HW (10%), Term Project(25%), Term Paper (25%), Attendance (5%)
NOTICE:
· Order of final term project preseataion is announced. (Updated 11/25/2010).
· The below cource schedule has been changed. (Updated 11/18/2010).
· Order of Paper presentation on DETER is announced (Updated 11/12/2010).
· According to the modified cource schedule, the students should submit the progress report of their TP until Nov. 9, 2010 (Updated 11/08/2010).
· Course schedule has been changed as the attached file (Updated 11/03/2010).
· Mid-term exam is announced (Updated 10/21/2010).
· Order of Paper presentation on SCA is announced (Updated 10/10/2010).
· Order of TP presentation is announced (Updated 09/29/2010).
· You should choose one paper in the following webpages and present the paper in the lecture. After choosing one paper, let me know your selection through e-mail. A paper will be assigned to you if you can notify your selection faster than the other students. (Updated 09/15/2010)
- Papers in "Listing of Research Papers" http://www.crypto.rub.de/en_sclounge.html
- Papers in security part on DETER testbed http://www.emulab.net/expubs.php
· If you have question, send e-mail to TA. (subject of e-mail must start with [CS748_STUDENTID])
· W. Stallings, "Cryptography and Network Security", 4th Ed., Pearson Education Inc, ISBN 0-13-187316-4, 2006
· J. Mirkovic, S. Dietrich, D. Dittrich and P. Reiher, "Internet Denial of Service, Attack and Defenses Mechanisms", 2005, Pearson Education Inc., ISBN 0-13-147573-8 http://www.pearsonhighered.com/educator/academic/product/0,,0131475738,00%2ben-USS_01DBC.html
· Side Channel Attack: http://www.crypto.ruhr-uni-bochum.de/en_sclounge.html
· DETER: http://www.isi.edu/deter/
· A.J. Menezes, P.C. van Oorschot, S.A. Vanston: Handbook of Applied Cryptography, CRC Press, 1997, ISBN 0-8493-8523-7
· A collection of Term Project during recent two years. Refer to this file [download]
Course Schedule:
Week |
Topic |
Remark |
1 |
|
|
2 |
~ 9/14: Deadline of course change |
|
3 |
Symmetric Cryptosystem |
9/16 : TP Proposal, 9/21 : No class |
4 |
Cryptanalysis, PKC #1 |
9/23: No class |
5 |
PKC #2, Hash Function |
|
6 |
|
|
7 |
Paper Presentation #1-1, #1-2 |
|
8 |
Mid-term Exam |
10/21 Take Home Exam |
9 |
|
|
10 |
|
|
11 |
Biometric Authentication, Multi-party Protocol |
11/9 TP Mid-report |
12 |
Paper Presentation #2-1, #2-2 |
This talk will be given by Prof. Chaeho Lim |
13 |
SSL & TLS, IPSEC, Firewall, IDS |
12/14 |
14 |
|
|
15 |
Secure Smart Grid, TP Final #1 |
|
16 |
Final Exam, TPFinal #2 |
12/16: Final Exam |
**Schedule can be subject tochange slightly depending on the number of enrolled students..
Useful links:
If you want to get more information of information security, click here.