ENEE 757 - Network and Distributed Systems Security

Fall 2007

 

Prerequisite: ENEE 647; or permission of instructor.

 

Threats and countermeasures in centralized and distributed systems; communication security techniques based on encryption; symmetric and asymmetric encryption; encryption modes, including stream and block encryption, and cipher block chaining; message origin and mutual authentication; third-party and inter-realm authentication, authentication of mobile users; data confidentiality and integrity protocols; formal analysis of authentication protocols and message integrity; access control in distributed systems and networks; firewall design; case studies of security mechanisms and policies.

Schedule/Location

Time: Monday/Wednesday 11:00am . 12:15pm

Instructor

Dr Virgil Gligor

Office: AVW 1333

Phone: 301-405-3647

Email: gligor (at) umd (dot) edu

 

Office Hours

Time: Monday/Wednesday 13:00pm . 14:00pm (or by Appointment)


Textbook

C. Kaufman, R. Perlman, and M. Speciner, Network Security . Private Communication in a Public World, 2002, Prentice Hall.

Syllabus

Handouts

·             Application oriented policies and their Compositions

·             Security Analysis of Symmetric Encryption Schemes

·             Guaranteeing Access in spite of Distributed Service-Flooding Attacks

·             Diffie-Hellman Key Exchange Protocol

·             Domain Name Systems

·             Domain Name Security Extensions

·             Hash Functions

·             Kerberos Authentication System (Kerberos v4)

·             Kerberos v5

·             A Logic of Authentication

·             Authentication: Theory and Practice, Taos OS

·             Oakley Key Determination Protocol

·             Introduction to Public Key Cryptosystems

·             On the Formal Definition of Separation of Duties Policies and their Composition

·             Trust Establishment in MANETs

·             Lecture Notes in Cryptography by Bellare and Goldwasser

?             Handling New Adversaries in Secure MANETs by Virgil Gligor

?             On the Evolution of Adversary Models (from the beginning to sensor networks) by Virgil Gligor