{"id":277,"date":"2019-01-15T10:51:47","date_gmt":"2019-01-15T16:51:47","guid":{"rendered":"http:\/\/engineering3.flywheelsites.com\/rkrishnan\/?page_id=277"},"modified":"2020-03-05T16:17:21","modified_gmt":"2020-03-05T22:17:21","slug":"intro-to-computer-and-network-security","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/","title":{"rendered":"Intro to Computer and Network Security"},"content":{"rendered":"<p><b>EE 5453 &#8211; Intro to Computer and Network Security &#8211; Spring 2020<br \/>\n<\/b><\/p>\n<hr \/>\n<p><b>Instructor:<\/b><br \/>\nRam Krishnan<br \/>\nMicrosoft President&#8217;s Endowed Associate Professor<br \/>\nDepartment of Electrical and Computer Engineering<br \/>\nUniversity of Texas at San Antonio<\/p>\n<p><b>Instructor Website:<\/b><br \/>\n<a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/ceid.utsa.edu\/rkrishnan\/<\/a><\/p>\n<p><b>Contact Info:<\/b><br \/>\nEmail: firstName <i>dot<\/i> lastName <i>at<\/i> utsa <i>dot<\/i> edu<br \/>\nAlso see instructor website above.<\/p>\n<p><b> Syllabus, Course Info, Office Hours, Course Policies, etc.:<\/b><br \/>\n<a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2020\/01\/syllabus_security_Spring_2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Click here.<\/a><\/p>\n<p><b>Lecture:<\/b><br \/>\nTime: Tuesdays and Thursdays 11:30 AM &#8211; 12:45 PM<br \/>\nLocation: MS 2.02.02<\/p>\n<p><b>Office Hours:<\/b><br \/>\nTuesdays and Thursdays 10:00 AM \u2013 11:15 PM. Instructor office at BSE 1.518.<\/p>\n<p><b>Tentative Schedule:<\/b><br \/>\n<a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2020\/01\/syllabus_security_Spring_2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">See syllabus.<\/a><\/p>\n<hr \/>\n<p><b>Important Notice<\/b><\/p>\n<ul>\n<li><span style=\"color: #ff0000\">02\/28: HW #5 posted. Due Mar 6, 11:59 PM.<\/span><\/li>\n<li>02\/20: HW #4 posted. Due Feb 27, 11:59 PM.<\/li>\n<li>02\/11: HW #3 posted. Due Feb 18, 11:59 PM.<\/li>\n<li>02\/04: HW #2 posted. Due Feb 11, 11:59 PM.<\/li>\n<li>01\/28: HW #1 posted. Due Feb 4, 11:59 PM.<\/li>\n<li>01\/21: First day of class. Please read the syllabus.<\/li>\n<\/ul>\n<hr \/>\n<p><b>Lecture Outline<\/b><br \/>\n<i> We will cover a lot of ground using the whiteboard. Materials will be posted on Blackboard.<br \/>\n<\/i><\/p>\n<ul>\n<li><strong>Lecture 14 (03\/05).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Hash function design, Sign and Encrypt vs Encrypt and Sign, HMAC.<\/li>\n<li><strong>Lecture 13 (03\/03).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Signature, Hash functions.<\/li>\n<li><strong>Lecture 12 (02\/28).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> RSA<\/li>\n<li><strong>Lecture 11 (02\/25).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> ElGamal<\/li>\n<li><strong>Lecture 10 (02\/20).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Prime fields, discrete log problem, Diffie-Hellman.<\/li>\n<li><strong>Lecture 09 (02\/18).\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Modular arithmetic.<\/li>\n<li><strong>Lecture 08 (02\/13).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Confidentiality and integrity, intro to public key crypto, Diffie-Hellman.<\/li>\n<li><strong>Lecture 07 (02\/11).\u00a0 <\/strong><a href=\"https:\/\/www.washingtonpost.com\/graphics\/2020\/world\/national-security\/cia-crypto-encryption-machines-espionage\/\">Read the story about Crypto AG<\/a>. <a href=\"https:\/\/www.youtube.com\/watch?v=SXAShotdFZo\">Another story (video) on location data collection.<\/a><br \/>\n<em> Topics covered:<\/em> Multiple encryption, Integrity.<\/li>\n<li><strong>Lecture 06 (02\/06).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Block ciphers.<\/li>\n<li><strong>Lecture 05 (02\/04).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Block ciphers.<\/li>\n<li><strong>Lecture 04 (01\/30).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Intro to symmetric key crypto.<\/li>\n<li><strong>Lecture 03 (01\/28).\u00a0\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Intro to crypto.<\/li>\n<li><strong>Lecture 02 (01\/23). No Face to face meeting. Assignment below.\u00a0<\/strong><br \/>\n<em> Topics covered:<\/em> Please review networking basics playlist at: <a href=\"https:\/\/www.youtube.com\/playlist?list=PLowKtXNTBypH19whXTVoG3oKSuOcw_XeW\">https:\/\/www.youtube.com\/playlist?list=PLowKtXNTBypH19whXTVoG3oKSuOcw_XeW<\/a><\/li>\n<li><strong>Lecture 01 (01\/21).<\/strong><br \/>\n<em> Topics covered:<\/em> Course overview. Please read the <a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2020\/01\/syllabus_security_Spring_2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">syllabus<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>EE 5453 &#8211; Intro to Computer and Network Security &#8211; Spring 2020 Instructor: Ram Krishnan Microsoft President&#8217;s Endowed Associate Professor Department of Electrical and Computer Engineering University of Texas at San Antonio Instructor Website: https:\/\/ceid.utsa.edu\/rkrishnan\/ Contact Info: Email: firstName dot lastName at utsa dot edu Also see instructor website above. Syllabus, Course Info, Office Hours, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Intro to Computer and Network Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":24,"featured_media":0,"parent":16,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-277","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intro to Computer and Network Security - Ram Krishnan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intro to Computer and Network Security - Ram Krishnan\" \/>\n<meta property=\"og:description\" content=\"EE 5453 &#8211; Intro to Computer and Network Security &#8211; Spring 2020 Instructor: Ram Krishnan Microsoft President&#8217;s Endowed Associate Professor Department of Electrical and Computer Engineering University of Texas at San Antonio Instructor Website: https:\/\/ceid.utsa.edu\/rkrishnan\/ Contact Info: Email: firstName dot lastName at utsa dot edu Also see instructor website above. Syllabus, Course Info, Office Hours, &hellip; Continue reading &quot;Intro to Computer and Network Security&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ram Krishnan\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-05T22:17:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/intro-to-computer-and-network-security\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/intro-to-computer-and-network-security\\\/\",\"name\":\"Intro to Computer and Network Security - Ram Krishnan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\"},\"datePublished\":\"2019-01-15T16:51:47+00:00\",\"dateModified\":\"2020-03-05T22:17:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/intro-to-computer-and-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/intro-to-computer-and-network-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/intro-to-computer-and-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Teaching\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/teaching\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Intro to Computer and Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\",\"name\":\"Ram Krishnan\",\"description\":\"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intro to Computer and Network Security - Ram Krishnan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Intro to Computer and Network Security - Ram Krishnan","og_description":"EE 5453 &#8211; Intro to Computer and Network Security &#8211; Spring 2020 Instructor: Ram Krishnan Microsoft President&#8217;s Endowed Associate Professor Department of Electrical and Computer Engineering University of Texas at San Antonio Instructor Website: https:\/\/ceid.utsa.edu\/rkrishnan\/ Contact Info: Email: firstName dot lastName at utsa dot edu Also see instructor website above. Syllabus, Course Info, Office Hours, &hellip; Continue reading \"Intro to Computer and Network Security\"","og_url":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/","og_site_name":"Ram Krishnan","article_modified_time":"2020-03-05T22:17:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/","name":"Intro to Computer and Network Security - Ram Krishnan","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website"},"datePublished":"2019-01-15T16:51:47+00:00","dateModified":"2020-03-05T22:17:21+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/intro-to-computer-and-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/"},{"@type":"ListItem","position":2,"name":"Teaching","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/teaching\/"},{"@type":"ListItem","position":3,"name":"Intro to Computer and Network Security"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/","name":"Ram Krishnan","description":"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/rkrishnan\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/277\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/16"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media?parent=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}