ENEE 757 - Network and Distributed Systems Security

Fall 2007

 

Prerequisite: ENEE 647; or permission of instructor.

 

Threats and countermeasures in centralized and distributed systems; communication security techniques based on encryption; symmetric and asymmetric encryption; encryption modes, including stream and block encryption, and cipher block chaining; message origin and mutual authentication; third-party and inter-realm authentication, authentication of mobile users; data confidentiality and integrity protocols; formal analysis of authentication protocols and message integrity; access control in distributed systems and networks; firewall design; case studies of security mechanisms and policies.

Schedule/Location

Time: Monday/Wednesday 11:00am . 12:15pm

Instructor

Dr Virgil Gligor

Office: AVW 1333

Phone: 301-405-3647

Email: gligor (at) umd (dot) edu

 

Office Hours

Time: Monday/Wednesday 13:00pm . 14:00pm (or by Appointment)


Textbook

C. Kaufman, R. Perlman, and M. Speciner, Network Security . Private Communication in a Public World, 2002, Prentice Hall.

Syllabus

Handouts

             Application oriented policies and their Compositions

             Security Analysis of Symmetric Encryption Schemes

             Guaranteeing Access in spite of Distributed Service-Flooding Attacks

             Diffie-Hellman Key Exchange Protocol

             Domain Name Systems

             Domain Name Security Extensions

             Hash Functions

             Kerberos Authentication System (Kerberos v4)

             Kerberos v5

             A Logic of Authentication

             Authentication: Theory and Practice, Taos OS

             Oakley Key Determination Protocol

             Introduction to Public Key Cryptosystems

             On the Formal Definition of Separation of Duties Policies and their Composition

             Trust Establishment in MANETs

             Lecture Notes in Cryptography by Bellare and Goldwasser

?             Handling New Adversaries in Secure MANETs by Virgil Gligor

?             On the Evolution of Adversary Models (from the beginning to sensor networks) by Virgil Gligor