Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: http://www.site.uottawa.ca/~cadams/index_files/seecshead.gif

CSI5105 (Registered at Carleton University as COMP5406)

ELG7178D (Registered at Carleton University as EACJ5606)

 

Network Security and Cryptography

Advanced methodologies selected from symmetric and public key cryptography, network security protocols and infrastructures, identification, secret sharing, anonymity, intrusion detection, firewalls, defending network attacks, and performance in communication networks.

 

Prerequisites: solid familiarity with basic concepts in networks, network security, and applied cryptography.

In particular, it is strongly recommended that the following courses (or their equivalents) should be taken, or at least audited, prior to this course in order to obtain the relevant background:

         CEG4185 or COMP3203 (computer networks)

         CSI4139/CEG4399 or  COMP4108 (secure computer systems)

         CSI4108 or ELG5373 or COMP4109 (cryptography)

 

Course Outline

 

Very useful paper on how to read a paper!

 

Note: for all assignments, 0.5 marks will be deducted if your summary is less than 1.75 pages or more than 2.25 pages.

Papers for Assignment #1

Papers for Assignment #2

Papers for Assignment #3

Papers for Assignment #4

 

Project: PETs definition and examples, allowed sources

-          List of projects (with format and due date); project marking scheme

 

Reading list (additional required reading/listening for the final exam)

 

Online course notes

         Week 1: Notes, slides

         Week 2: OWASP

         Week 3: Notes

         Week 4: Notes, XACML

         Week 5: Notes

         Week 6: (midterm, no notes)

         Week 7: (reading week, no notes)

         Week 8: slides

         Week 9-10: We discussed example PETs using the structure of the Privacy Classification given in class

         Week 10: We covered the remainder of the Privacy Intro slides