Security and Cryptography (S2, 2015)
Course Overview
This course aims to introduce you to the principles and techniques of securing computers and computer networks, with focus on Internet security. The course introduces the theory of cryptography, including how many classical and popular algorithms work (e.g. DES, RSA, digital signatures). Also covered are authentication techniques and key distribution mechanisms. Selected security protocols, especially used in the Internet today, are covered towards the end. You will learn both theoretical aspects of computer and network security, as well as how that theory is applied in the Internet. This knowledge will help you in designing and developing secure applications and network protocols, as well as building secure networks.
- Lecturer
- Dr Steven Gordon (contact details)
- Lecture Times
-
- Monday 9:00-12:00, BKD2501
- Textbook
- Cryptography and Network Security, 5th Edition by Williams Stallings, Prentice Hall, 2010. (additional resources)
- Prerequisites
- No formal prerequisites, although it is expected that you have good knowledge of system/software design principles (e.g. passed operating systems and data structures courses) and basic knowledge of data communications (e.g. passed ITS323 or similar). See the Study Guide for advice on refreshing your knowledge in these areas.
- Online Resources
- Course Home: http://ict.siit.tu.ac.th/moodle/course/view.php?name=css441y15s2
YouTube: http://www.youtube.com/StevesLectures
Past courses available via: ./ - Related Courses
- ITS335 IT Security is a related course I teach to information technology students. ITS335 is more practical, while this course (CSS441) is more theoretical. ITS335 covers a wide range of security issues and technologies relevant to computer systems and networks. It focuses on the purpose of different technologies and how they can be applied. ITS335 is of benefit to those that need to select and apply security technologies in organisations. CSS441 is of benefit to those that need to design and implement security algorithms and protocols.
Course Material
- Schedule: Schedule of lectures, listing the topics covered each week.
- Assessment Criteria: Expectations of students and methods for assessing their work.
- News Forum: Course announcements and news. Also distributed by email.
- Extra Resources: Other resources, such as textbooks, past courses and background material, that may help you be successful in this course.
- Security Links: Links to selected websites and documents related to security. Includes companies, alerts, attacks and different cryptographic techniques.
- Topics and Lecture Material: list of topics, and for each topic a page containing lecture notes, handouts, videos and examples.
- Quizzes and Homework: links to quizzes and homeworks.
- Exams: links to midterm and final exam details.
Return to: Course Home | Course List | Steven Gordon's Home | SIIT