Instructor: Chen Qian <qian at ucsc.edu>, Office: E2-231
Class meeting time: Tuesday and Thursday 01:30PM-03:05PM
Classroom: Earth&Marine B210
Office hours: Tuesday 11AM - Noon or by appointment
Course Focus
This course provides a basic overview to the principles and practice of network security. The key topics of this course include principles of cryptography, network security protocols, Digital Signatures, Internet security, Cloud security, WiFi security, IoT security and Web security. Students will complete reading reports, a midterm exam, a class presentation and a course project.
Undergraduate or graduate Computer Network course (CMPE150 or equivalence)
Undergraduate or graduate Algorithm course
2. (free) A Graduate Course in Applied Cryptography (V 0.4) by D. Boneh and V. Shoup, https://toc.cryptobook.us/
Additional research papers will be used as reading material
In recent years, there has been an increased number of academic integrity violation incidents in many UC campuses, and unfortunately, UCSC is no exception. The School of Engineering has a zero tolerance policy for any incident of academic dishonesty. If cheating occurs, they will result in academic sanctions in the context of the course, and in addition, every case of academic dishonesty is referred to the students' college Provost, who then sets the disciplinary sanctions. Cheating in any part of the course may lead to failing the course and suspension or dismissal from the University.
What is cheating? In short, it is presenting someone else's work as your own. Examples would include copying another student's written or electronic homework assignment, or allowing your own work to be copied. Although you may discuss problems with fellow students, when you submit an assignment with your name on it, it is assumed it is your own work. If you use ideas or text from others, you MUST cite your sources and give credit to whoever contributed to your work.
If there are any questions on what constitutes academic integrity violations, please make sure to talk to the instructor and/or the TAs for clarification. You are also referred to www.ucsc.edu/academics/academic_integrity/ for additional information on UCSC's academic integrity policies.
Disability Resource Center (DRC) Resource
UC Santa Cruz is committed to creating an academic environment that supports its diverse student body. If you are a student with a disability who requires accommodations to achieve equal access in this course, please submit your Accommodation Authorization Letter from the Disability Resource Center (DRC) to me privately during my office hours or by appointment, preferably within the first two weeks of the quarter. At this time, I would also like us to discuss ways we can ensure your full participation in the course. I encourage all students who may benefit from learning more about DRC services to contact DRC by phone at 831-459-2089, or by email at drc@ucsc.edu.
Grading Rubric | ||||||||||
|
There are around 16 presentations in total and you should submit no fewer than 10 reading reports.
Each report will be graded as a check- (0.5pt) ,check (1pt), or check+ (1.5pt).
You may submit more but we only count the 10 reports with highest grades.
Reading reports are submitted at the beginning of every presentation class.
Some slides are revised from the ones by Kurose/Ross and Simon Lam.
Date | Topic | Readings |
Lecture Notes |
1.7 | General class information | slides | |
1.9 |
Principles of crypto: stream cipher |
slides | |
1.14 |
Principles of crypto: block cipher |
slides | |
1.16 | Principles of crypto: integrity | slides | |
1.21 |
Principles of crypto: key exchange and public key |
slides | |
1.23 | Digital signature | [R1] | slides |
1.28 | SSL and WLAN security | [R3] | slides1 slides2 |
1.30 | Anonymous communication | slides | |
2.4 | ITPIR | [R2] | slides |
2.6 | Blockchain | slides | |
2.11 | Midterm exam Sample midterm questions | ||
2.13 |
ABE, P: Spencer C: Haoyuan, Search index, P: Si Man, C: Sonali |
[2] [4] |
|
2.18 |
Obladi, P: Yiwen, C: Tingting OblivP2P, P: Juan, C: Ian |
[5] [6] |
|
2.20 |
Ghostbuster, P: Barbara, Yiting C: Michael HoMonit, P: Melenie and Yuyang, C: Yiwen and Xi |
[7] [8] |
|
2.25 |
IoT security 1, P: Xi, C: Lakshmi IoT security 2, P: Anuj, C: Juan and Melenie |
[9] [10] |
|
2.27 |
Karaoke, P: Tingting, C: Luis and Neil DNS, P: Michael and Ian, C: Spencer and Siman |
[11] [12] |
|
3.3 |
NetHide, P: Luis, C: Anuj SpeedyMurmur, P: Xiaoxue, C: Barbara |
[13] [14] |
|
3.5 |
Blind CA, P: Neil, C: Luis Teechain, P: Xiaoxue, C: Yiting |
[15] [16] |
|
3.10 |
BITE, P: Haoyuan, C: Xiaoxue Robust NN, P: Harikrishna, C: Yuyang |
[17] [18] |
|
3.12 |
NN inversion, P: Lakshmi and Sonali, C: Harikrishna Selected project presentation Harikrishna Kuttivelil Spencer |
[19]
|
|
3.20 | Final project due | ||
|
|||