Network Security and Cryptography
Advanced methodologies selected from symmetric and public key cryptography, network security protocols and infrastructures, identification, secret sharing, anonymity, intrusion detection, firewalls, defending network attacks, and performance in communication networks.
Prerequisites: solid familiarity with basic concepts in networks, network security, and applied cryptography.
In particular, it is strongly recommended that the following courses (or their equivalents) should be taken, or at least audited, prior to this course in order to obtain the relevant background:
· CEG4185 or COMP3203 (computer networks)
· CSI4139/CEG4399 or COMP4108 (secure computer systems)
· CSI4108 or ELG5373 or COMP4109 (cryptography)
Very useful paper on how to read a paper!
Note: for all assignments, 0.5 marks will be deducted if your summary is less than 1.75 pages or more than 2.25 pages.
Papers for Assignment #1
Papers for Assignment #2
Papers for Assignment #3
Papers for Assignment #4
Reading list (additional required reading/listening for the final exam)
Online course notes
· Week 2: OWASP
· Week 3: Notes
· Week 5: Notes
· Week 6: (midterm, no notes)
· Week 7: (reading week, no notes)
· Week 8: slides
· Week 9-10: We discussed example PETs using the structure of the Privacy Classification given in class
· Week 10: We covered the remainder of the Privacy Intro slides