Prerequisite: ENEE 647; or permission of instructor.
Threats and countermeasures in centralized and distributed systems; communication security techniques based on encryption; symmetric and asymmetric encryption; encryption modes, including stream and block encryption, and cipher block chaining; message origin and mutual authentication; third-party and inter-realm authentication, authentication of mobile users; data confidentiality and integrity protocols; formal analysis of authentication protocols and message integrity; access control in distributed systems and networks; firewall design; case studies of security mechanisms and policies.
Time: Monday/Wednesday 11:00am . 12:15pm
Office: AVW 1333
Phone: 301-405-3647
Email: gligor (at) umd (dot) edu
Time: Monday/Wednesday 13:00pm . 14:00pm (or by Appointment)
C. Kaufman, R. Perlman, and M. Speciner, Network Security . Private Communication in a Public World, 2002, Prentice Hall.
· Application oriented policies and their Compositions
· Security Analysis of Symmetric Encryption Schemes
· Guaranteeing Access in spite of Distributed Service-Flooding Attacks
· Diffie-Hellman Key Exchange Protocol
· Domain Name Security Extensions
· Kerberos Authentication System (Kerberos v4)
· Authentication: Theory and Practice, Taos OS
· Oakley Key Determination Protocol
· Introduction to Public Key Cryptosystems
· On the Formal Definition of Separation of Duties Policies and their Composition
· Trust Establishment in MANETs
· Lecture Notes in Cryptography by Bellare and Goldwasser
? Handling New Adversaries in Secure MANETs by Virgil Gligor
? On the Evolution of Adversary Models (from the beginning to sensor networks) by Virgil Gligor