Lecture 1 - Introduction
Lecture 1 - Introduction
Computers and
Information Security
Fall 2023/2024
Lecture # 1
Introduction
The text book
Class textbook:
INTRODUCTION TO CRYPTOGRAPHY AND
NETWORK SECURITY,
Behrouz A. Forouzan, McGraw-Hill.
Course Information Policies
• Grading:
• 2 Quizzes: 8% (4% each)
• Homework & Attendance: 8%
• Project: 14%
• Midterm Exam: 30%
• Final Exam: 40%
• Attendance:
• Attendance is mandatory
COURSE PLAN
Week Hours
Topic
# Total. Lec. Ex. Lab
1. Introduction & Mathematical Background 3 2 - 2
2. Classical Cryptography 3 2 - 2
3. Symmetric Key Cipher (DES and AES) 3 2 - 2
4. Asymmetric Key Cipher (RSA) 3 2 - 2
5. Hash Function 3 2 - 2
6. Digital Signature 3 2 - 2
7. Trust, PKI, Key Management 3 2 - 2
8. Network Layer Security: IPsec 3 2 - 2
9. Transport Layer Security: SSL/TLS 3 2 - 2
10. Application Layer Security: PGP, SMIME 3 2 - 2
11. Firewalls 3 2 - 2
12. Viruses and Worms 3 2 - 2
Total 36 24 - 24
Lecture Contents
❑ Security objectives
❑ Security goals
❑ Security attacks
❑ Security services
❑ Security mechanisms
❑ Cryptography and steganography
Security Objectives, ADVERSARIES
…
PRIVACY AUTHENTICITY IDENTITY
I don’t want others to see my emails or chats; get my national number, credit-card
number or medical records; know which web sites I visit, what I buy, where I travel. I don’t
want them to know my salary, how I vote, what movies I like, whether I sing in the shower.
Coca-Cola does not want its formula revealed, corporations want to protect their
technology, governments want their plans kept secret.
Security Objectives
…
PRIVACY AUTHENTICITY IDENTITY
I don’t want the emails or chats I send or receive to be I want to be sure that entities I
modified or faked. I don’t want my allergy information to be interact with are who they claim to
erased from my medical record. I don’t want my accounts to be, whether it be my friend
be broken into. I don’t want the data I communicate to my Alice, my doctor or google.
bank to be modified.
Servers don’t want to hacked into. Companies want to
control access to their databases.
Why privacy matters
http://zeroknowledgeprivacy.org/library/why-privacy-matters/
AUTHENTICITY is the PRIVACY is the set of blinds
lock on your front door. on your living-room window.
Well, kind of …
PRIVACY
AUTHENTICITY
But these IDENTITY
are not precise terms or distinctions.
One should be wary of debating terms rather than issues!
The Snowden
The Snowden
revelations
revelations
The Snowden revelations
20
1-3 SERVICES AND MECHANISMS