...Tentative Syllabus CMSC 652 Cryptography and Data Security Instructor: Dr. Lomonaco 1. Classical cryptography 2. Abstract algebra: Groups, rings, fields 3. Linear feedback shift registers 4. Shannon theory, i.e., information theory 5. Block Ciphers and the AES 6. Cryptographic hash functions 7. The RSA crypto system 8. Public-key crypto and discrete logs 9. Signature Schemes 10. Pseudo-random number generators 11. Identification schemes and entity authentication 12. Key distribution 13. Key agreement schemes 14. Secret sharing schemes 15. Computational models and computational complexity 16. Zero-knowledge proof systems 17. Quantum cryptography Method of Evaluation: Homework: 25% ; Exam 1: 25% ; Exam 2: 25%; Final: 25%. All exams including the Final Exam will be with closed books, closed notes, and open mind. Late homework will not be accepted. Exams will be given only at the scheduled times. No makeup exams. Exceptions to this policy may be made in cases of extreme hardship. Academic Conduct: By enrolling in this course, each student assumes the responsibilities of an active participant in UMBC's scholarly community in which everyone's academic work and behavior are held to the highest standards of honesty. Cheating, fabrication, plagiarism, and helping others to commit these acts are all forms of academic dishonesty, and they are wrong. Academic misconduct could result in disciplinary action that may include, but is not limited to, suspension or dismissal. To read the full...
Words: 251 - Pages: 2
...Week 7 Homework July 16, 2012 1. Explain the four goals associated with computer threats. • Data Confidential- is keeping secret data secret. • Data Integrity- unauthorized users not allowed to modify data without owner’s permission. • System Availability- no one can disturb system making it unusable. • Privacy - protecting individual from misuse information about them. 2. Explain the main difference between Secret-Key Cryptography and Public-Key Cryptography. Secret-Key Cryptography the key is private and with Public-Key Cryptography the key is public. 3. What is the digital signature? A technology used to associate a users’ identity to a public key, in which the user’s public key is digitally signed by a trusted third party. 4. What is packet sniffer? Is a software that examines all incoming and outgoing network packets looking for certain patterns. 5. Explain the various types of attacks from inside listed in section 9.5 of the text. 1.) Logic bombs - piece of code in a production system that clears disk, erases files at random, making hard-to-detect changes to key programs or encrypting essential files 2.) Trap door - Code inserted into computer system that allows hackers to bypass the entire authentication process. 3.) Login in spoofing - A phony copy of a system login system used to obtain user id’s and password 6. Explain the difference between a virus and a worm? Virus...
Words: 471 - Pages: 2
...Homework Chapter 1 The Revolution Is Just Beginning 1) The term e-business refers to the digital enabling of transactions and processes involving an exchange of value across organizational boundaries. Answer: FALSE 2) Price discovery refers to the ability of merchants to segment the market into groups willing to pay different prices. Answer: FALSE 3) Personalization involves targeting marketing messages to specific individuals by adjusting the message based upon a consumer's preferences or past purchasing behavior. Answer: TRUE 4) The online marketplace is characterized by persistent price dispersion. Answer: TRUE 5) The future of e-commerce is likely to include a decrease in government regulation both in the United States and worldwide. Answer: FALSE 6) Which of the following statements about e-commerce in the United States in 2014 is not true? D) Growth rates for retail e-commerce are higher in the United States than in China. 7) In 2014, roughly ________ million people in the United States accessed the Internet via tablets. C) 147 8) Which of the following is not a major business trend in e-commerce in 2014-2015? B) Small businesses and entrepreneurs are hampered by the rising cost of market entry caused by increased presence of industry giants. 9) All of the following are major social trends in e-commerce in 2014-2015 except for: C) the refusal of online retailers to accept taxation of Internet sales. 10) Which of the following...
Words: 3335 - Pages: 14
...Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand the course: Boson Netsim / Packet Tracer acketTracer.html ...
Words: 1513 - Pages: 7
...Rock Laguerre IT255 Homework Instructor: Nicole Taylor 1. _____________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and non-repudiation. A. Security association (SA) B. Secure socket layer (SSL) * C. Cryptography D. None of the above 2. A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message. * True B. False 3. The act of scrambling plaintext into ciphertext is known as __________ A. Decryption * B. Encryption C. Plaintext D. Cleartext 4. An algorithm used for cryptographic purposes is known as a ______________ A. Hash B. Private key C. Public key * D. Cypher 5. Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key * True B. False 6. An encryption cipher that uses the same key to encrypt and decrypt is called a ____________ key * Symmetric (private) B. Asymmetric (public) C. Key encrypting D. None of the above 7. ______________ corroborates the identity of an entity, whether the sender, the sender’s computer, some device, or some information. A. Non-repudiation B. Confidentiality C. Integrity * D. Authentication 8. Which of the following is one of the four basic forms of a cryptographic attack? A. Ciphertest-only attack B. Known-plaintext attack C. Chosen-plaintext attack D. Chosen-ciphertext attack ...
Words: 309 - Pages: 2
...is compulsory. (See the Student Charter.) Make sure you scan your card. Tutorials: Normally on Tuesday afternoon. The tutorials will be in groups of about 20. They form an integral part of the course and attendance is compulsory. They start in Week 1. Set work Work will be set by the lecturer weekly on Monday at the 2pm lecture. It will be already available on VITAL from the previous Friday. The set work consist of two very similar parts: • set C – for solving and detailed discussion at the coming Tuesday tutorial, and • set H – written solutions to which you should hand to your MATH103 tutor by 4 pm next Thursday. All the problems are to be studied before the Tuesday tutorial. Your submitted solutions are marked by your tutor and handed back the following Tuesday; the lecturer’s solutions are available online the same day. Web publications All module materials will be available on VITAL as soon as they are needed in the class. Hard copies of some houndouts will also be distributed, but only once. Closer to the end of the semester, past papers will be put on VITAL. Class Tests There will be one class test during the module; the date will be announced at least a week in advance. Examinations The course will be assessed by a single 2 1 hour examination paper in January. Your perfor2 mance at the tutorial classes (including a mini-project consisting of 5 extra individual problems) contribute 10% to the final assessment (key skills). Another 10% of the final mark are coming...
Words: 1033 - Pages: 5
... A. Fundamentals of Information Systems Security 2nd Edition, Kim, David. Students have two options. They can order from the EPCC campus bookstore, or they can order from the publishers shopping portal (www.shopjblearning.com). Below are the bundle breakdowns and options: OPTION 1: Purchase at EPCC Bookstore: Printed Access Code (For Bookstore) Print Bundle: a. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07445-1 Bookstore sets student price: eBundle: a. eBook Rental + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07444-4 Bookstore sets student price: OPTION 2: JONES & BARTLETT: E-mailed Access Code (For Student). Students can go to: www.shopjblearning.com, enter the ISBN in the Search field, and then Add to Cart- proceeding through the checkout process. Print Bundle: b. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07440-6 Approx. cost to the student: $170 eBundle: b. eBook Rental + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07439-0 Approx. cost to the student: $150 c. Virtual Lab Access/eLab Manual ONLY ISBN: 978-1-284-07446-8 Approx. cost to the student: $117 B. Required Materials 1. Internet Access to utilize the online Virtual Lab Environment. 2. USB Flash Drive– minimum 4GB (Gigabyte).(Note: You do not...
Words: 1345 - Pages: 6
...|[pic] |Course Syllabus | | |College of Natural Sciences | | |MTH/208 Version 6 | | |College Mathematics I | | |HEFOUN88 | Copyright © 2012, 2011, 2008, 2007, 2006, 2005 by University of Phoenix. All rights reserved. Course Description This course begins a demonstration and examination of various concepts of algebra. It assists in building skills for performing specific mathematical operations and problem solving. These concepts and skills serve as a foundation for subsequent quantitative business coursework. Applications to real-world problems are emphasized throughout the course. This course is the first half of the college mathematics sequence, which is completed in MTH/209: College Mathematics II. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: ...
Words: 2592 - Pages: 11
...Course Syllabus MTH/208 – College Mathematics 1 Course: X Course Start Date: X Course End Date: X Campus/Learning Center : X |[pic] |Syllabus | | |College of Natural Sciences | | |MTH/208 Version 6 | | |College Mathematics I | Copyright © 2012, 2011, 2008, 2007, 2006, 2005 by University of Phoenix. All rights reserved. Course Description This course begins a demonstration and examination of various concepts of algebra. It assists in building skills for performing specific mathematical operations and problem solving. These concepts and skills serve as a foundation for subsequent quantitative business coursework. Applications to real-world problems are emphasized throughout the course. This course is the first half of the college mathematics sequence, which is completed in MTH/209: College Mathematics II. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: ...
Words: 3371 - Pages: 14
...CIS4361C IT Security Course Syllabus Version 1 FALL 2015 Course Description This course introduces students to information security. Security often involves social and organizational skills as well as technical understanding. In order to solve the practical security problems, we must balance real-world risks and rewards against the cost and bother of available security techniques. During this course we will use continuous process improvement to investigate these elements. Security is a very broad field. Some people may excel in the technical aspects, while others may do better in more social or process-oriented aspects. Others will successfully succeed between these poles. This course applies to all students, and help you find where you will excel. To learn a solid understanding of security technology, look must look closely at the underlying strengths and weakness of information technology itself. This requires particularly in cryptography (diagram or in mathematical notation). The book will use both, but is bias toward diagrams. Prerequisites COP2253 Java Programming or COP2830 Script Programming Student Learning Outcomes Upon completion of this course, students will be able to: * Describe the common treats of information and communication systems * Identify safeguards for securing data and systems * Gather and analyze digital evidence after a security breach * Develop an IT security program based upon a risk assessment Course Objectives ...
Words: 1802 - Pages: 8
...[pic] College of Natural Sciences Course Design Guide MTH/208 Version 5 College Mathematics I Copyright Copyright © 2011, 2008, 2007, 2006, 2005 by University of Phoenix. All rights reserved. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix® editorial standards and practices. Course Description This course begins a demonstration and examination of various concepts of algebra. It assists in building skills for performing specific mathematical operations and problem solving. These concepts and skills serve as a foundation for subsequent quantitative business coursework. Applications to real-world problems are emphasized throughout the course. This course is the first half of the college mathematics sequence, which is completed in MTH 209: College Mathematics II. Course Topics & Objectives Week One: Fundamentals of Expressions • Identify real and variable elements. • Classify...
Words: 2601 - Pages: 11
...COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of...
Words: 69922 - Pages: 280
...SOLUTIONS MANUAL CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FOURTH EDITION WILLIAM STALLINGS Copyright 2006: William Stallings -2- © 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. -3- NOTICE This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S. -4- TABLE OF CONTENTS Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20: Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard ................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard ...................
Words: 21497 - Pages: 86
...Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...
Words: 229697 - Pages: 919
...ECONOMIC AND SOCIAL COMMISSION FOR ASIA AND THE PACIFIC INTERNET USE FOR BUSINESS DEVELOPMENT AN INTRODUCTORY SET OF TRAINING MODULES FOR POLICYMAKERS UNITED NATIONS Bangkok 2007 INTERNET USE FOR BUSINESS DEVELOPMENT AN INTRODUCTORY SET OF TRAINING MODULES FOR POLICYMAKERS United Nations publication Copyright © United Nations 2007 All rights reserved Manufactured in Thailand The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The views expressed do not necessarily represent the decisions or the stated policy of the United Nations. Mention of firm names and commercial products does not imply the endorsement of the United Nations. This publication has been issued without formal editing. ii PREFACE The role of small and medium-sized enterprises (SMEs) in national competitiveness and development, as well as in generating jobs and revenues for countless citizens, is well documented. Their meaningful and useful access to Information and Communications Technologies (ICT), particularly the Internet, will significantly enhance this critical role and will drive demand for and innovation in the ICT sector even more. This set of training modules was therefore developed to serve...
Words: 27227 - Pages: 109