ECE 409 Cryptography and System Security

Winter 2016 Instructor: Professor G. Gong

Office: EIT 4158, x35650, ggong@uwaterloo.ca, http://comsec.uwaterloo.ca

Course Description: This course will provide introduction to cryptology and computer security, theory of secure communications, points of attack, conventional cryptographic systems, public key cryptographic systems, network standards and protocols, wireless system security, and applications.

Outcomes: Equip students with the basics in modern computer network and security systems.

Prereq Topics: mathematical reasoning, combinatorics, statistics, probability.

Prereqs: ECE 358 or at least 4A computer, electrical or software Engineering.

Antireqs: CO 485, 487, CS 458

Resources Text: L.D. Chen and G. Gong, Communication System Security, CRC, 2012.

References:

  1. ECE 409 Course Notes.
  2. W. Stallings, Cryptography and Network Security: Principles and Practice, 6/E, Prentice Hall, 2014.

Tutorial Description: Question and answer on material covered in lectures, specific help with current homework assignment, and problem solving skills.

Course Outline:

  1. Introduction to cryptography and system security: cryptology, cryptanalysis, encryption and authentication, classification of cryptosystems, and basic concepts of secure communications.
  2. Networks and Systems: Model of secure systems, types of attacks, attacking points, trust model, threat model, trusted platform, and protected communications.
  3. Conventional Cryptographic Systems: Perfect secrecy, pseudorandomness, computational security, arithmetics of finite fields, symmetric-key systems (A5, RC4, WG, DES, AES, SHA1, SHA3, MAC), correlation attack, birthday attacks, and time-memory trade-off attacks.
  4. Introduction to Public Key Cryptographic Systems: arithmetic operations, discrete logarithm and integer factorization algorithms, public-key systems (RSA, DH, DSS, ECC, LWE and FHE), faulty attacks on RSA.
  5. Implementing Secure Systems: infrastructure support, key generation, crypto specifications, PKI, X.509 certificates, and key escrow.
  6. Internet Standards and Protocols: the man-in-the-middle attacks, mutual authentication, key establishment, security association, network security protocols (IPsec, SSL/TLS, SSH, S/MIME), protection models, attacks on SSL/TLS, and firewalls.
  7. Wireless System Security: wireless access authentication and key agreement, AAA, EAP, air link protection (3G/4G-LTE), IEEE 802.11 security solutions (flawed WEP, CCMP).
  8. Applications: IoT, RFID systems, smart cards, side-channel attacks, trusted platform module, cloud security, and image encryption.

Course Grading: The overall grade is based on assignment questions, one course project (individual), one midterm exam, and one final exam, which is distributed below.

  • Assignment questions: 10%
  • Midterm examination: 30%
  • Course project: 10%
  • Final examination: 50%