\setcounter{numTAs}{0} \setcounter{totalSections}{2} \def\secNum{{"001","DL1",""}} \def\tenSchFileName{{"","",""}} \def\classTime{{"Wednesdays from 12:00 pm to 02:30 pm","Wednesdays from 12:00 pm to 02:30 pm",""}} \def\classRm{{"Drosdick Hall 314","either asyncronously (watch recorded video within 2 days) or live on Zoom:",""}} \def\classLive{{"","https://villanova.zoom.us/j/99697036557",""}} \def\classInstructor{{"Danai Chasaki","Danai Chasaki",""}} \def\classInstrContact{{"http://www.ece.villanova.edu/\~dchasaki/","http://www.ece.villanova.edu/\~dchasaki/",""}} \def\classInstrOffHrs{{"Tuesdays 10-11:30 am","Tuesdays 10-11:30 am",""}} \def\classInstrLive{{"https://villanova.zoom.us/j/5258112428?pwd=d3F1dndCYUtRdWwwUEh2ZDJjQUoxUT09","https://villanova.zoom.us/j/5258112428?pwd=d3F1dndCYUtRdWwwUEh2ZDJjQUoxUT09",""}} \def\TA{{{""},{""},{""}}} \def\TAEmail{{{""},{""},{""}}} \def\TAOffHrs{{{""},{""},{""}}} \def\TARoom{{{""},{""},{""}}} \newcommand\semester{Fall 2025} \newcommand\rsemester{202620} \newcommand\courseNum{ECE 8476} \newcommand\courseName{Cryptography and Network Security} \newcommand\courseCoordinator{Danai Chasaki} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\AIPolicyExists{0} \newcommand\isClassLive{1} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{1} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{- one weekly lecture} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{0} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{1} \newcommand\txtBkPublExists{1} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{Cryptography and Network Security Principles and Practice} \newcommand\textBookAuth{William Stallings} \newcommand\textBookPub{Prentice Hall} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall.} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Theory and practice of computer communications security, including cryptography, authentication, and secure electronic mail. Topics include secret and public key cryptography; message digests; password-based, address- based, and cryptographic authentication; privacy and authentication in email; PEM, PGP, and S/MIME. Use of various algorithms.} \newcommand\preReqs{None} \newcommand\coReqs{None} \newcommand\coreRequirement{Required for Cybersecurity M.S. Degree} \newcommand\courseExpectation{The goal for students in this course is to learn the fundamentals of cryptography and network security including: secret key cryptography, public key cryptography and message digests, key management, authentication, cipher techniques, security protocols, attacks and defenses on computer systems.} \newcommand\ABETOutOneA{0} \newcommand\ABETOutOneB{0} \newcommand\ABETOutTwoA{0} \newcommand\ABETOutTwoB{0} \newcommand\ABETOutTwoC{0} \newcommand\ABETOutTwoD{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFourA{0} \newcommand\ABETOutFourB{0} \newcommand\ABETOutFourC{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSixA{0} \newcommand\ABETOutSixB{0} \newcommand\ABETOutSevenA{0} \newcommand\ABETOutSevenB{0} \newcommand\covTopics{\item Introduction to network security \item Basic cryptography \item Key management \item Authentication \item Security protocols \item Firewalls, intrusion detection, and other countermeasures} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{18} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|c|X} \toprule \large \textbf{Week \#} & \large \textbf{Dates} & \large \textbf{Topics, Reading, etc.}\\ \midrule \midrule 1 & 8/25 - 8/29 & \\ 2 & 9/1 - 9/5 & \\ 3 & 9/8 - 9/12 & \\ 4 & 9/15 - 9/19 & \\ 5 & 9/22 - 9/26 & \\ 6 & 9/29 - 10/3 & \\ 7 & 10/6 - 10/10 & Midterm Exam\\ 8 & 10/13 - 10/17 & Fall break\\ 9 & 10/20 - 10/24 & \\ 10 & 10/27 - 10/31 & \\ 11 & 11/3 - 11/7 & \\ 12 & 11/10 - 11/14 & \\ 13 & 11/17 - 11/21 & \\ 14 & 11/24 - 11/28 & Thanksgiving break\\ 15 & 12/1 - 12/5 & Student presentations\\ 16 & 12/8 - 12/12 & Student presentations\\ 17 & 12/15 - 12/19 & Final Exam\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{A composite score (out of 100) will be computed by assigning weights as follows.\\ \\ \textcolor{violet}{ Homework: 20\% \\ Midterm Exam: 25\% \\ Final Exam: 25\% \\ Project: 30\% \\ } The final grade will be norm-referenced (i.e., "curved").} \newcommand\HWandLabPolicy{Several sets of homework and hands-on assignments will be assigned during the semester. The assignments will be posted on the class website and announced in class. Students will work individually; the due date for each assignment will be given at the time it is assigned. The reports will be collected at the start of the class in which they are due or latest at the start of the following class.\\ There will be two exams, midterm and final, scheduled for Oct. 8th and Dec. 17th respectively. Details will be discussed one week prior to the exam.\\ Students are also expected to actively read the state-of-the-art research papers. Each student will research on a "hot" area and submit a 1-3 page proposal before the mid-term exam. Before the final exam submit a 5-10 page summary reporting your findings, and give one presentation to the rest of the class. The schedule of the presentation will be discussed at a later time. The presentations are meant to update fellow students on current trends, technologies, and issues that related to network security. The grades of the presentation come from evaluation from fellow students in the class as well as the instructor. A list of recommended papers will be distributed later in the class. Students are also encouraged to search for their own papers. In this case, you need to get the approval from the instructor for the topic and papers you select to study.\\ Assignments are due as posted on the course web page (or stated in the syllabus). Late submissions will not be accepted unless by prior arrangement with the instructor. Scheduling conflicts regarding exams should be reported to the instructor immediately. In case of a medical emergency, late submission or a make-up exam can be requested if a note from a medical professional is provided.} \newcommand\AIPolicy{\textcolor{red}{ Since you opted for an AI Policy, you should edit this part, choosing one of the following statements, modifying as desired:\\ \\ The use of AI-generated content is not permitted in this course. Its use will result in an academic integrity violation and a zero on the assignment.\\ \\ OR\\ \\ The use of AI-generated content is allowed in this course.\\ \\ OR\\ \\ The use of AI-generated content is permitted as follows: (a) for generating a first draft or (b) for generating an outline or (c) for generating XXX.\\ \\ AND, if AI is allowed:\\ \\ Even if you have significantly edited AI-generated material, you must identify the AI tool used to assist in generating your work. You are required to provide the name of the tool, date used, and prompts used to generate the output. As you may be required to submit the original AI output, you must keep a copy of the original output and provide it when requested. If questions arise about the authorship of submitted work, you are responsible for authenticating your authorship. You should save evidence of your authorial process, such as drafts, notes, version histories, and complete transcripts of AI assistance. }} \newcommand\AttendancePolicy{The primary teaching method will be class lectures and discussions. The lectures will discuss topics presented in the textbook and cover additional material. Class attendance is expected in every class. For students who choose to study asynchronously, the definition of attendance is watching the recorded lectures on Blackboard within two days.} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}