{"id":402,"date":"2015-08-22T08:46:19","date_gmt":"2015-08-22T13:46:19","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=402"},"modified":"2016-10-21T16:29:27","modified_gmt":"2016-10-21T21:29:27","slug":"csc-541-crypto-netsec-fall-2015","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/csc-541-crypto-netsec-fall-2015\/","title":{"rendered":"CSC 541 Cryptography and Network Security, Fall 2015"},"content":{"rendered":"<h4>\n\t<span style=\"font-size:14px\"><strong>Instructor: Dr. Natarajan Meghanathan<\/strong><\/span><br \/>\n<\/h4>\n<p>\n\t<font color=\"#ff0000\"><b>Final Exam (Exam 3) will be on Wednesday, Dec. 2nd&nbsp;(Modules 8, 9 and 10): <u>Closed Notes<\/u>. <u>Only traditional calculators are allowed<\/u>. Cell Phones should be kept aside and not used for calculations.<\/b><\/font>\n<\/p>\n<p>\n\t<font color=\"#ff0000\"><b>Project 2 (hard copy) due on Monday, Nov. 30, 4 PM, in class. Links for Uploaded Video Submissions should be emailed by 4 PM.<\/b><\/font>\n<\/p>\n<p>\n\t<span style=\"font-size:14px\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\n\t<a href=\"#Syllabus\">Syllabus<\/a><br \/>\n\t<a href=\"#LectureSlides\">Lecture Slides<\/a><br \/>\n\t<a href=\"#Projects\">Projects<\/a><br \/>\n\t<a href=\"#DesktopVideos\">Desktop Videos<\/a><br \/>\n\t<a href=\"#SampleQuestions\">Sample Questions<\/a><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/span>\n<\/p>\n<h3>\n\t<span style=\"font-size:14px\"><a name=\"Syllabus\">Syllabus<\/a><\/span><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC-541-Cryptography-NetworkSecurity-Syllabus-Fall-20151.pdf\" target=\"_blank\">CSC 541 Syllabus, Fall 2015<\/a>\n<\/p>\n<h3>\n\t<span style=\"font-size:14px\"><a name=\"LectureSlides\">Lecture Slides<\/a><\/span><br \/>\n<\/h3>\n<p>\n\t<span style=\"font-size:14px\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-0-Introduction.pdf\" target=\"_blank\">Module 0: Introduction<\/a><\/span>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-1-Classical-Stream-Ciphers.pdf\" target=\"_blank\">Module 1: Classical Symmetric Ciphers<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-2-Advanced-Symmetric-Ciphers.pdf\" target=\"_blank\">Module 2: Advanced Symmetric Ciphers<\/a> &nbsp;\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-3-NumberTheory-RSA.pdf\" target=\"_blank\">Module 3: Number Theory and RSA<\/a><span style=\"font-size: 13px;line-height: 20.8px\">&nbsp;<\/span>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-4-KeyDistribution-Management.pdf\" target=\"_blank\">Module 4: Key Distribution and Management<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-5-Data-Integrity.pdf\" target=\"_blank\">Module 5: Data Integrity<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-6-Web-Security.pdf\" target=\"_blank\">Module 6: Web Security<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-7-TCP-IP-Stack-Addresses-Overview.pdf\" target=\"_blank\">Module 7: TCP\/IP Stack and Addressing Schemes: An Overview<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-8-Classical-NetworkSecurity-Attacks.pdf\" target=\"_blank\">Module 8: Classical Network Security Attacks<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-9-Firewalls-IDS.pdf\" target=\"_blank\">Module 9: Firewalls and Intrusion Detection Systems<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Module-10-IPSec.pdf\" target=\"_blank\">Module 10: IPSec<\/a>\n<\/p>\n<h3>\n\t<span style=\"font-size:14px\"><a name=\"Projects\">Projects<\/a><\/span><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Project-1-Vigenere-Cipher.pdf\" target=\"_blank\">Project 1: Implementing Encryption and Decryption using Vignere Cipher<\/a>&nbsp; (deadline: October 14, 2015: 4 PM)\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-Project-2-CAPTCHA-ImageDisplay-Selection.pdf\" target=\"_blank\">Project 2: Use of CAPTCHA (Image Display and Selection Strategy) to Prevent Cross-site Request Forgery (XSRF) Attacks <\/a>&nbsp; &nbsp; <span style=\"font-size: 13px;line-height: 20.8px\">&nbsp;<\/span><span style=\"font-size: 13px;line-height: 20.8px\">(deadline: November 30, 2015: 4 PM)<\/span>&nbsp;<span style=\"color:#FF0000\"> <strong>Download the Online Banking Application Archive (a Zip file) from JSU Blackboard<\/strong><\/span>\n<\/p>\n<h3>\n\t<span style=\"font-size:14px\"><a name=\"DesktopVideos\">Desktop Videos<\/a><\/span><br \/>\n<\/h3>\n<p>\n\t<u><strong>Module 2<\/strong><\/u>\n<\/p>\n<p>\n\t<strong>Data Encryption Standard (DES)<\/strong>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/r6ZYb_3-Yh4\" target=\"_blank\">DES: Encryption; S-Boxes and P-Boxes<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/OQwuNhqCuTk\" target=\"_blank\">DES: Decryption; Weaknesses; Double and Triple DES<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/1rjFz0b0e70\" target=\"_blank\">DES: Chosen Plaintext Attack exploiting the Bit-wise Complement Property<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/UmnuuHoCZtE\" target=\"_blank\">DES: Feistel Network Outputting all 1s and the Impact on the Rounds<\/a>\n<\/p>\n<p>\n\t<strong>Advanced Encryption Standard (AES)<\/strong>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/AORWmV6mlsU\" target=\"_blank\">AES: Overview<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/dN2pJRLRcb0\" target=\"_blank\">AES: Sub steps details and Finite Field Arithmetic<\/a>\n<\/p>\n<p>\n\t<strong><u>Module 4<\/u><\/strong>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/ioE58kfAh0s\" target=\"_blank\">Primitive Root and Examples<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/jhODCIVLvFs\" target=\"_blank\">Diffie-Hellman Key Exchange and Examples<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/PPt7yvBtGRI\" target=\"_blank\">Man in the Middle Attack on Diffie-Hellman Key Exchange and Solution using Public Key Certificate<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/youtu.be\/DWQpxiXwccQ\" target=\"_blank\">Public Key Certificates and their Use for Message Authentication and Integrity<\/a>\n<\/p>\n<h3>\n\t<span style=\"font-size:14px\"><a name=\"SampleQuestions\">Sample Questions<\/a><\/span><br \/>\n<\/h3>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-QuestionBank.pdf\" target=\"_blank\">Sample Questions (Modules 0-7)<\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/files\/2015\/08\/CSC541-Fall2015-QB-Final-Modules-8-9-10.pdf\" target=\"_blank\">Question Bank for Final Exam (Modules 8, 9, 10)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructor: Dr. Natarajan Meghanathan Final Exam (Exam 3) will be on Wednesday, Dec. 2nd&nbsp;(Modules 8, 9 and 10): Closed Notes. Only traditional calculators are allowed. Cell Phones should be kept aside and not used for calculations. Project 2 (hard copy) due on Monday, Nov. 30, 4 PM, in class. Links for Uploaded Video Submissions should [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/402"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":53,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/402\/revisions"}],"predecessor-version":[{"id":697,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/402\/revisions\/697"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}