Security and Privacy on the Internet (60-564)

 

home
syllabus
assignments
materials

UNIVERSITY OF WINDSOR

(Fall 2004)

PROJECT DETAILS :

RESEARCH PROJECTS

Students are required to produce two projects on an applied aspect of cryptography or network security, building upon and complementing the material covered in the class. You will be working with other class members as part of a team.

A set of suggested projects is included below. You may select one of the suggested projects or you may devise your own comparable project. All projects must be approved by the instructor. Each topic will be allocated to only one group. i.e. More than one group cannot work on the same topic.

PROCEDURE for ALLOCATION of the PROJECT:

Every group may scan through the list and try to decide about the topic, it would like to have. On Tuesday, 29 Jan 2002, at 2.30 in Room No. 2139, the topic allocation will be finalized. If there is more than one group, which is opting for the same topic, the allocation will be decided by a draw at that time.

By 2nd Feb 2002, every team must submit, by e-mail, a well-organized proposal of one to three pages in length. The proposal should clearly describe the project to be undertaken, including the topic to be covered, any investigation, development, or experimentation to be conducted and the expected results.

Each projects must culminate in

Ř           A presentation for the class and

Ř           The submission of a final report

§         A soft copy, in word, along with

§         A hard copy.

READING/REPORT ASSIGNMENTS

Reference: Cryptography & Network Security by Stallings, published by Prentice Hall, second Edition.

1.      Cryptography:  Why is it harder than it looks?

Ref.: (1) Chapter 1

         (2) Why cryptography is harder than it looks

                         By Bruce Schneier

                http://www.counterpane.com/whycrypto.html

2.      CONVENTIONAL ENCRYPTION: CLASSICAL TECHNIQUES

Ref.: (1) Chapter 2

         (2) Steganography.

                     By Neil F. Johnson

              http://www.jjtc.com/stegdoc/index2.html

3.      CONVENTIONAL ENCRYPTION: MODERN TECHNIQUES

Ref.: (1) Chapter 3

         (2) Minimal Key Lengths for Symmetric Ciphers to provide Adequate Commercial Security.

             By Matt Blaze, Whitfield Diffie, Ronald L.Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, and Michael Wiener

             http://www.counterpane.com/keylength.pdf

4.      CONVENTIONAL ENCRYPTION: ALGORITHMS

Ref.: (1) Chapter 4

         (2) Tea: Tiny Encryption Algorithm

             http://www.cl.cam.ac.uk/ftp.papers/djw-rmn-tea.html

5.      CONFIDENTIALITY USING CONVENTIONAL ENCRYPTION

Ref.: (1) Chapter 5

         (2) RFC 1750 Randomness Recommendations for Security      December 1994

            http://www.ietf.org/rfc/rfc1750.txt

6.      PUBLIC-KEY CRYPTOGRAPHY

Ref.: (1) Chapter 6

         (2) Asymmetric Encryption: Evolution and Enhancements

               Cryptobytes Volume 2, No.1 – spring 1996 (pdf, 210k)

             http://security.ece.orst.edu/koc/ece575/rsalabs/crypto2n1.pdf

7.      INTRODUCTION TO NUMBER THEORY

 Ref.: (1) Chapter 7

          (2) Some primality testing algorithms,

                By Richard Pinch AMS Notices, 40, no.9 (Nov 1993)

             http://www.chalcedon.demon.co.uk/publish.html#42

8.  MESSAGE AUTHENTICATION AND HASH FUCTION

Ref.:(1) Chapter 8

        (2) A logic of Authentication, SRC Research Report 39

        http://www.research.compaq.com/SRC/publications/cartoons/src-rr-039.html

9.  HASH AND MAC ALGORITHMS

Ref.:(1) Chapter 9

        (2) Tiger: A fast New Hash Function,

             Fast Software Encryption 3, 1996, LNCS 1039

        http://www.cs.technion.ac.il/~biham/Reports/Tiger/

10.   DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS

Ref.: (1) Chapter 10

         (2) “Digital Signatures: A tutorial Survey.” Computer, February 1983

             Leddy Library, Call Number: QA76.C5671

11.   AUTHENTICATION APPLICATIONS

Ref.:(1) Chapter 11

        (2) Kerberos: An Authentication Service for Open Network Systems.

              In proceeding of the Winter 1988 usenix Conference. February, 1988

              By J.G. Steiner, B. Clifford Neuman, and J.I.Schiller

          http://web.mit.edu/kerberos/www/papers.html

12.   ELECTRONIC MAIL SECURITY

Ref. (1) Chapter 12

        (2) Security, Payment, and privacy for Network Commerce

              By  B. Clifford Neuman    IEEE Journal on selected areas in

              Communications, 13(8):1523-1531.October 1995.

        http://ieeexplore.ieee.org/lpdocs/epic03/VSearch.htm

        (On campus computers)

13.  IP  SECURITY

Ref.: (1) Chapter 13

         (2) A Security Architecture for the internet Protocol

               By Cheng et al IBM Systems Journal, No.1, 1998

        http://www.research.ibm.com/journal/sj/371/cheng.html

14.  WEB  SECURITY

Ref. (1) Chapter 14

        (2) Achieving Electronic Privacy

             By David Chaum Scientific American, August 1992

          http://ntrg.cs.tcd.ie/mepeirce/project/chaum/sciam.html

15. INTRUDERS AND VIRUSES

Ref.: (1) Chapter 15

         (2) There be Dragons

               By Steven M. Bellovin. ATT.COM. August 15, 1992.

          http://www.research.att.com/~smb/papers

16. FIREWALLS

Ref.: (1) Chapter 16

         (2) Firewalls Fends Off Invasion from the Net

             By Lodin and Schuba IEEE Spectrum, February 1998.

        http://ieeexplore.ieee.org/lpdocs/epic03/VSearch.htm

        (On campus computers)

 

 

Home | Syllabus | Assignments | Materials |