《密码学与安全协议》实验教学大纲
课程代码 | 045101921 |
课程名称 | 密码学与安全协议(MOOC) |
英文名称 | Cryptographyand Security Protocols(MOOC) |
课程类别 | 专业基础课 选修课 |
课程性质 | 必修 选修课 |
学时 | 总学时:48 实验:16 实习:0 其他:0 |
学分 | 2.5 |
开课学期 | 第五学期 |
开课单位 | 计算机科学与工程学院 |
适用专业 | 信息安全;网络工程 |
授课语言 | 中文 |
先修课程 | 计算机网络、信息安全数学基础 |
毕业要求(专业培养能力) | 本课程对学生的毕业要求如下: 1.设计/开发解决方案:能够设计针对信息安全复杂工程问题的解决方案,设计满足特定需求的信息安全解决方案,并能够在设计环节中体现创新意识,考虑社会、健康、安全、法律、文化以及环境等因素。 2.研究:能够基于科学原理并采用科学方法对信息安全复杂工程问题进行研究,包括设计实验、分析与解释数据、并通过信息综合得到合理有效的结论。 3.使用现代工具:能够针对信息安全复杂工程问题,开发、选择与使用恰当的技术、资源、现代工具和信息技术工具,包括对信息安全复杂工程问题的预测与模拟,并能够理解其局限性。 4.工程与社会:能够基于信息安全工程相关背景知识进行合理分析,评价信息安全专业工程实践和复杂工程问题解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任。 |
课程培养学生的能力(教学目标) | 完成课程后,学生将具备以下能力: (1)掌握密码学与安全协议的基础知识,培养学生发现问题、解决问题的基本能力。 (2)掌握密码学与安全协议的基本技能,学生具有信息安全初步实践能力。 通过本课程的学习,学生应掌握现代密码学的基本原理,了解现代密码学中的主要方法和关键技术,初步掌握一些现代密码学中的高级课题。 |
课程简介 | 本课程介绍了密码学与安全协议相关的基础知识和技术方法。系统讲授了网络安全通信、网络安全协议和网络安全实现的基本原理、方法和策略。 本课程由两部分构成。第一部分网络安全通信从传统密码理论、公钥密码理论详细讨论了网络安全通信实现的原理,涉及到点到点加密传输、端到端加密传输、消息认证码、Hash函数以及数字签名和公钥证书等内容。第二部分网络安全实现讨论了重要的网络安全工具和应用软件,包括鉴别应用、电子邮件的安全性、IP的安全性和Web安全。 |
主要仪器设备与软件 | 安装Wireshark软件的PC机 |
实验报告 | 本门课程的实验要求学生能完成给定课题,实验报告中包括实验的基本步骤说明、对关键技术的分析与理解,包括实验过程和结果的相关图表加以说明。 |
考核方式 | 考核成绩由实验课考勤和实验报告的完成情况两部分组成 |
教材、实验指导书及教学参考书目 | Stinson D R. 密码学原理与实践:第二版[M].电子工业出版社,2003. WilliamStallings, 密码编码学与网络安全原理与实践,2015, 电子工业出版社. |
制定人及发布时间 | 许勇 2019.4.1 |
《密码学与安全协议》实验教学内容与学时分配
实验项目编号 | 实验项目名称 | 实验学时 | 实验内容提要 | 实验类型 | 实验要求 | 每组人数 | 主要仪器设备与软件 |
1 | 网络数据包监听与分析 | 4 | 了解、熟悉Sniffer软件的主要模块和特点,能用Sniffer采集数据包并对其进行网络安全事件的深入分析。 | 综合性 | 必做 | 1 | 硬件:计算机; 软件:Windows操作系统、Sniffer |
2 | 现代加密系统设计与实现 | 4 | 开发实现一个S-DES和RSA加解密系统,在界面上输入明文和密钥,系统可以输出正确的密文。通过曲线图分析算法的雪崩效应。 | 综合性 | 必做 | 1 | 硬件:计算机; 软件:Windows操作系统、VisualStudio等编程环境 |
3 | 数字证书:原理、配置、编程与应用 | 8 | 利用浏览器导出数字证书,描述数字证书基本原理和主要内容,生成、配置并管理数字证书,编写一个带GUI的证书信息读取器(选做);选取一种证书的典型应用(如电子邮件)进行过程描述并实践。 | 综合性 | 必做 | 2 | 硬件:计算机、网络; 软件:Windows操作系统、openSSL、Outlook |
“Cryptographyand Security Protocols” Syllabus
CourseCode | |
CourseTitle | Cryptographyand Security Protocols(MOOC) |
CourseCategory | SpecialtyBasic Courses |
CourseNature | CompulsoryCourse |
ClassHours | 48 |
Credits | 2.5 |
Semester | 5th |
Institute | Schoolof Computer Science and Engineering |
ProgramOriented | InformationSecurity, Network Engineering |
TeachingLanguage | Chinese |
Prerequisites | ComputerNetworks, Mathematical Fundamentals for Information Security |
StudentOutcomes (Special Training Ability) | 1. Designing and DevelopingSolutions: with the ability to design the solutions to complex andspecific engineering problems in information security, to have aninnovative sense in the design phase by considering the factors ofsociety, health, safety, law and culture. 2. Research: with the abilityto conduct investigations on the complex engineering problemsbased on scientific principles and adopting scientific methods,including the experiment designs, analyzing and interpretation ofdata, and to obtain valid conclusions by information synthesis. 3. Applying the Modern Tools:with the ability to develop, select and use the appropriatetechniques, resources, and modern tools and IT tools, includingprediction and simulation, to solve the complex engineeringactivities in information security and understand the limitations. 4.Engineering and Society: with the ability to reasonably analyzeand evaluate the impacts of professional engineering practice andsolutions to the complex engineering problems to society, health,safety, law and culture issues by using the background knowledgeof information security engineering, to understand the consequentresponsibility. |
TeachingObjectives | After teaching, students havethe following abilities: (1)Understandingthe fundamental knowledge of the cryptography and securityprotocols, make the students have the ability to design thesolutions to complex and specific engineering problems ininformation security. (2)Understandingthe basic technologies of the cryptography and securityprotocols,,makethe students have the ability to solve the complex engineeringactivities in information security. |
CourseDescription | Thiscourse introduces the fundamental knowledge and technology of thecryptography and security protocols, including the principles,methods and policies of network security communication, networksecurity protocols and network security implements. This courseconsists of two parts. The first part is network securitycommunication. Based on conventional cryptosystem and public-keycryptosystem, the principles of network security implements arediscussed, which includes link to link encryption, end to endencryption, MAC, Hash function, digital signature and digitalcertificate. In the second part, the important network securitytools and application of network security implements arediscussed, which include authentication, email security, IPsecurity and web security. |
Instrumentsand Equipments | PCequipped with Wireshark |
ExperimentReport | This courserequires student to finish the given tasks and submit lab reports,which includes description of the basic steps of the experiment,analysis and understanding of key technologies and diagrams of theexperimental process and results. |
Assessment | Attendanceof experimental courses and completion of experimental reports. |
TeachingMaterials and Reference Books | Stinson D R. 密码学原理与实践:第二版[M].电子工业出版社,2003. WilliamStallings, 密码编码学与网络安全原理与实践,2015, 电子工业出版社. |
Preparedby Whom and When | YongXu, 2019.4.1 |
“Cryptographyand Security Protocols”ExperimentalTeaching Arrangements
No. | ExperimentItem | ClassHours | ContentSummary | Category | Requirements | Numberof Students Each Group | Instruments,Equipments and Software |
1 | NetworkPacket Monitoring and Analysis | 4 | Understandthe main modules and features of Sniffer software, use Sniffer tocollect data packets and its network security events in-depthanalysis. | Comprehensive | Compulsory | 1 | Hardware:computer; Software:Windows operating system, Sniffer |
2 | Designand Implementation of Modern Encryption System | 4 | Develop anS-DES and RSA encryption and decryption system with the followingcharacteristics: If you enter plain text and key on the interface,the system can output the correct ciphertext. Analyze theavalanche effect of the algorithm by graph. | Comprehensive | Compulsory | 1 | Hardware:computer; Software:Windows operating system, Visual Studio or other programmingenvironment |
3 | Digitalcertificate: principle, configuration, programming and application | 8 | Use abrowser to export a digital certificate, describe its basics andmain content, and learn how to generate, configure, and manage it.Write a certificate reader with GUI (optional). Select a typicalapplication of a certificate (such as an e-mail application) todescribe and practice the process. | Comprehensive | Compulsory | 2 | Hardware:computer, network; Software:Windows operating system, openSSL, Outlook |