Home / Teaching / CSC489 — Selected Topics in Computer Science (Applied Cryptography and Web Security) — Spring 2016

CSC489 — Selected Topics in Computer Science (Applied Cryptography and Web Security) — Spring 2016

  • Course Information 
  • Lecture Notes & Readings 
  • Individual Research 
  • Group Project 
  • Exams

 

Coures Overview

An overview of the fundamentals of Cryptography and how are they used in real world applications. In the first half of the course we will examine cryptographic primitives and algorithms and discuss their goals and properties. We will also discuss cryptographic protocols and their design. In the second half of the course, we will discuss how cryptographic blocks are used to build some real world applications such as SSL/TLS, Wireless Security, SSH, IPSec and others. We will take web security as a case study on how many secure properties were achieved using cryptography.

Prerequisite

  • Completing 100 hours of the course of the undergraduate program.
  • Technical Prerequisite — Familiarity with wired and wireless computer networking and web technologies (such as http and html).

Class Schedule

Lectures

  • Mondays [3:00 pm – 4:50 pm].
  • Wednesdays [3:00 pm – 3:50 pm].

Lectures will be held at the CCIS Building (31) Room (1-A-014).

Tutorials

  • Wednesdays [2:00 pm – 2:50 pm].

Tutorials will be held at the CCIS Building (31) Room (1-A-013).

Textbook

  • Everyday Cryptography: Fundamental Principles and Applications, by Keith M. Martin [amazon].

Grading and Assessment

  • Individual Research and Presentation (10%)
  • Group Project (40%)
  • Midterm (10%)
  • Final Exam (40%)

Grade distribution is subject to change.

Academic Integrity

Academic Honesty and Ethical behavior are required in this course, as it is in all courses at King Saud University. The class will be conducted according to the policy set by KSU (لائحة تأديب الطلاب). Please take the time to read it carefully. This policy will be followed unless I provide written documentation of exceptions.

Late Policy

Missing the deadline (without a VALID and PREVIOUSLY APPROVED Excuse)

  • If you submit within an hour, you’ll loose 20% of grade.
  • If you submit within 24 hours, you’ll loose 50% of grade.
  • After that you’ll get 0% of the grade.

Class Announcements

All the class announcements and discussions will be posted on Piazza.

Week

Monday

Wednesday

Week 1
Jan. (17-21)

No Class

Week 2
Jan. (24-28)

  • How to cite other’s work (pdf)
  • Security Introduction (slides)

Week 3
Jan. 31 – Feb. 4

  • Classical Cryptography (slides)
  • Modern Cryptography (slides)
  • Deadline: submit a printed copy of your individual research proposal (beginning of class)

Week 4
Feb. (7-11)

  • Deadline: submit a printed copy of your group project proposal (beginning of class)
    • Also, submit the team contract as part of your proposal signed be each member of your group (file).
  • Presentation: for groups projects (10 min for each project)

Week 5
Feb. (14-18)

  • Modern Cryptography – Asymmetric Cryptography (slides)
  • Continue with Asymmetric Cryptography

Week 6
Feb. (21-25)

  • Cryptographic Protocols (slides)
  • Continue with Cryptographic Protocols

Week 7
Feb. 28 – March 3

  • Continue with Cryptographic Protocols
  • Continue with Cryptographic Protocols

Week 8
March (6-10)

  • Presentation: for individual research (10 min each)

Week 9
March (13-17)

Mid-Semester Break

Mid-Semester Break

Week 10
March (20-24)

  • Presentation: for groups projects — progress report (15 min for each project)
  • Deadline: each group member needs to submit the Group Process Evaluation Form” at the beginning of the class (file)
  • Midterm

Week 11
March (27-31)

  • Continue with Network Security
  • Continue with Network Security

Week 12
April (3-7)

  • Continue with Network Security — IPSec.
  • Presentation: for groups projects.

Week 13
April (10-14)

  • Continue with Network Security — SSL/TLS.
  • Continue with Network Security — Wireless Networks Security.

Week 14
April (17-21)

  • Lecture canceled because of Cyber Arabia.
  • Presentation: for groups projects.

Week 15
April (24-28)

  • Finish Network Security — Cellular Networks Security.
  • Lecture Canceled.

Week 16
May 1-5

  • Deadline: to submit a printed copy of the individual research report (beginning of class)
  • Final Presentation: for individual research (15 min each)
  • Deadline: to submit a printed copy of the group project report (beginning of class)
    • Each member needs to submit a group assessment form (file).
  • Final Presentation: for groups projects (30 min each)

Students’ Topics

  • Social Networks and Privacy: Locations — Abdullah Alsuliman
  • The Psychology of Arabic-Speaking User’s Passwords — Abdullah Baltif
  • Why Do Arabic-Speaking Users Fall for Phishing? — Nawaf Alsaadi
  • Genetic Algorithms and their Security Applications — Faris Al-Hathlol
  • Risks of Pacemaker Devices — Saleh Alajmi
  • Profiling Saudi Defacement Attacks — Hesham AlSadan

Generic Information

You should work on an individual research in an area of information security and applied cryptography that interests you. The outcome of your research could involve developing a proof-of-concept.

Topics sources

Timeline

  • Feb. 3rd — Submit a printed copy of your individual research proposal at the beginning of class.
    • This should include the following:
      • Title.
      • One paragraph of what you intend to do [no more than 300 words].
      • One sentence of what are you going to deliver at the end of the semester (analysis, comparison, proof-of-concept, etc) [no more than 20 words].
      • A list of reference, tools, and resources where you plan to read and investigate.
  • March 9th — give a 10 minutes presentation about your progress and submit a progress report. These should discuss the following
    • You should mainly discuss all the literature review you did in the project.
    • You might also discuss some of the preliminary results you found.
    • Make sure you reference all you the resources you read and investigated.
    • Expect questions.
  • April 27th — is the deadline to finish the research.
    • You should submit a final report at the beginning of class. You also need to give a final presentation for all the work you did and the results you found.
    • Expect questions.

Referencing

You should correctly cite other people’s work. This guide can give you a good introduction.

Grade Distribution

  • 10% on proposal
  • 15% on first presentation
  • 10% on first progress report
  • 30% on final presentation
  • 35% on final report.

Generic Information

You should form a group of 3 to 4 people to work on a project in an area of information security. Your project should use the applied cryptography concepts we studied in class to solve a problem you specify. The output of your project must include a prototype of a solution your worked on as a team to address a security concern.

Topics sources

Group Paper Work & Evaluation

  • Feb. 8th — You need to submit this team contract as part of your proposal signed be each member of your group (file).
  • March 21st — Each member of the groups needs to submit to me directly the “Group Process Evaluation Form” at the beginning of the class (file). Just type your group name and submit anonymously.
  • May 2nd — Each member needs to submit a group assessment form (file).

Timeline

  • Feb. 8th — Submit a printed copy of your group project proposal at the beginning of class.
    • This should include the following:
      • Title.
      • Team leader.
      • Project members.
      • Task distribution.
      • One paragraph of what you intend to do and the problem you are trying to solve [no more than 300 words].
      • One paragraph of what are you going to deliver at the end of the semester. For example, the type of software you are going to build, programming language used, etc.
      • A list of reference, tools, and resources where you plan to use, investigate, and integrate.
      • Team contract document (see above).
  • Feb. 10th — Present a 10 minutes group presentation discussing your project proposal. You should discuss all the details in your project proposal.
  • March 21st — give a 15 minutes group presentation about your progress and submit a progress report. These should discuss the following
    • You should mainly discuss all the similar work you found.
    • You should discuss the design and different components of your project.
    • Make sure you reference all you the resources you used.
    • You should present the beta version of your proposed solution.
    • Expect questions.
    • Each member needs to submit the “Group Process Evaluation Form” (see above).
  • May 2nd — is the deadline to submit your group project.
    • You should submit a final report at the beginning of class. You also need to give a final presentation for all the work you did and the results you found.
    • Expect questions.
    • Each member needs to submit the “Group Assessment Form” (see above).

Suggested Tools to Use

  • Development Framework: it is recommended to use an agile methodology to implement your solution. Scrum is one of the best frameworks to use.
  • Project Management: Trello or Asana
  • Collaboration and Discussions: Slack
  • Code Version Control: Github

Grade Distribution

  • 5% on proposal
  • 5% on form submissions (individual and group forms)
  • 5% on first presentation
  • 15% on second presentation
  • 5% on first progress report
  • 35% on final presentation
  • 30% on final report.

Midterm

  • Exam will be held during class time on Wednesday March 23rd (tentative).
  • Exam will be one hour long.

Final Exam

  • Date will be set by the college.