College of Science

Courses

Data Security II

Course Code C0673 Th 4 Pr 4 CrHrs 3

This Course presents the principles of data security and the science behind every form of security starting with the conventional encryption systems to the modern encryption systems. So, the students will acquire the knowledge about most of common cryptographic techniques along with most common types of attacks that can be utilized to ruin the security of these techniques.  

       At the end of this course the students should have the ability to: 

  1. Design secure system based on cryptographic algorithms.
  2. Differentiate between types of encryption algorithms and be able to choose the best one based on its level of security. 

c. Analyze most common types of attacks and find ways to defend the system from these attacks.

Ill ustrate the use of Public and Private Key algorithms in building secure and modern system.

Distribution of Marks

Final Mark

Final Exam

Second Term

Mid-Year

First Term

100

Prac.

Theor.

Prac.

Theor.

Prac.

Theor.

Prac.

Theor.

20

30

5

5

10

20

5

5

References

SN

William Stalling, “Cryptography and network security, principles and

practices”, 4th edition, prentice hall, Pearson education international, 2011

1

Alan G. Konheim, “ Computer security and cryptography ”, John Wiley & Sons, 2007

2

Hans Delfs, Helmut Knebl, "Introduction to Cryptography, principles and applications", 2nd edition, Springer-Verlag Berlin Heidelberg, 2007

3

Subject

Week

Introduction to practical security, Diffusion and Confusion, Shannon’s five criteria.

First

Concept of randomness, statistical tests for randomness, Introduction to stream cipher, One Time Pad (OTP).

Second

Linear Feedback Shift Register (LFSR) and Non Linear Feedback Shift Register

Third

Introduction to block cipher, Data Encryption Standard (DES) Algorithm.

Fourth

Full Example of DES algorithm, Part one: Processing the key.

Fifth

Part two: Processing the text.

Sixth

Introduction to Modern Cipher systems, RSA Algorithm

Seventh

Diffie-Helman key Exchange

Eighth

Digital Signature

Ninth

Introduction to data hiding, history and terminology

Tenth

Types of Steganography techniques, Requirements of steganographic system

Eleventh

Requirements of watermarking system, Difference between steganography and watermarking

Twelfth

Attacks against Steganography and Watermarking systems

Thirteenth

Intruders, Hackers, Intrusion Techniques.

Fourteenth

Intrusion Detection, Approaches to Intrusion Detection, Honeypots.

Fifteenth