810:088 Topics: Network Security (Summer 2004)
-
Note One of two Take Home Exam part 1 and
details of where to turn in and when is final due date, etc.
-
Take home exam FIVE QUESTIONS: Take Home Exam
is complete and available here.
DOWNLOAD for June 22nd class.
Might want to Use MOZILLA in the CEEE lab instead of KONQUEREOR
It respects the HTML P paragraph tag.
It shows .txt files with a fixed-width font in the browser window.
Use the K menu, Start Command and type Mozilla.
Textbooks:
-
Secrets
and Lies - Digital Security in a Networked World by Bruce Schneier
-
Cryptography
Decrypted by H. X. Mel, Doris M. Baker
Last years page: Summer of 2003 (July) Network Security
class web site.
Some links to explore on networks and security
issues.
Internet Security
Glossary.
Another helpful glossary of Internetworking Terms and concepts.
This LAN is your LAN.
- IP numbers and BINARY (base 2), along with base 16
(hexadecimal) number system.
- Subnet masks and IP numbers used to break
networks like uni.edu (134.161.0.0) down into different subnetworks
so ROUTING can still be done WITHIN uni.edu.
- Know the OSI 7 Layer model. And
also.... Vip...
Please Do Not Throw Sausage Pizza Away! :-)
-
Slides: Chapter 11 IP, subnet masks
portion.
(You do NOT have this textbook, but the slides are a good summary of
the concepts for this summer's Network Security class and supplement to our
class lectures and discussions).
Slides: Chapter 11 IP, subnet
masks for OLDER BROWSERS and CEEE lab
-
How strong was the DES encryption in 1975? How fast was it
broken only 23 years later?
DES
encryption is weak
now. See Moore's Law and DES from the textbook readings.
- What is Public Key Cryptography?
- PGP (Pretty Good Privacy).
- What are the two kinds of PORTS that are used in
providing network communications?
- Digital signatures
and hash functions.
- The detection and correction of errors: Hamming
codewords, parity methods and CRC.
- Ethereal Capture file #1 and
Ethereal Capture file #2.
-
PERL programs and data for testing.
- Comparing different
length Vignere ciphers:
The ghost.txt file with Vignere cipher length = 2, 3, 6, 12 and 24.
Notice how the statistical pattern of some letters being the most
frequent and some being the least frequent are obscured more
as the Vignere cipher goes from two characters up to 24 characters!
Showing only the 4 or 5 most frequent
letters and the 3 or 4 least frequent for 2, 3, 6, 12 and 24.
- The Common Body of Knowledge for the security
certification exam. You have as a handout the Security Management Practices
study guide. It is one of the ten domains of security knowledge.
- Last summer's PRESENTATIONS,
of the 17 students who did theirs with PowerPoint or a web published approach.
Ordinal Values (ASCII values of characters)
using a PERL program.
- Prime numbers and encryption algorithms.
- Presentation #1 by Karla: High Fidelity
version and another version for
1990s old model T
browsers. Notes pages have been added by Mark Jacobson that elaborate
on the presentation.
-
Cryptography (LOW, for older
browsers), and
Cryptography (HIGH, for
state of the art and newest web browsers.
-
Physical Security (HIGH)
for the best presentation possibilities, and ...
Physical Security (HIGH),
for older browsers.
-
Firewalls (HIGH) and
the low fidelity, older-browser compatible version of the
Firewalls (LOW)
student presentation.
READING ASSIGNMENTS:
Week one: Chapters one thru five of Cryptography Decrypted (pages 1-44)
Chapter one and two of Secrets and Lies (pages 1-22)
Week two: Chapter nine: Pioneering Public Key: (Thursday and Friday)
Public Exchange of Secret Keys
Graduate student Ralph Merkle's system
developed at Berkeley in the early 70s.
Chapter thirteen: Hashes Non-Keyed Message Digests (Friday)
md5sum program used in lab to demonstrate this
message digest and hashing idea
Secrets and Lies book
Chapter 3: Attacks pages 23-41 (Friday readings)
Week three:
Chapter ten: Confidentiality Using Public Keys (Monday)
Chapter eleven: Making Public Keys: Math Tricks (Monday)
Secrets and Lies book
Chapter 4: Adversaries pages 42-58 (Monday readings)
Chapter 5: Security Needs pages 59-82 (Tuesday readings)