Internet Security and E-commerce Protocols
Objectives and Requirements
This course aims to provide students with opportunities to understand the problems and requirements of information security related computer systems as well as to learn the state-of-the-art techniques for enforcing computer and network security and developing secure e-commerce protocols.
After learning the course, the students should be able to:
1. identify the security requirements of various security systems;
2. assess the security threats of systems against various attacks and identify potential security problems on Internet services and communications;
3. design secure e-commerce protocols or systems using cryptographic algorithms and protocols;
4. evaluate the security and performance of security algorithms and protocols, and e-commerce systems.
Contents
A selection of topics from the following: network security, computer security, malicious software, access control, firewall, intrusion detection systems, classical cryptography, symmetric-key encryption, DES, AES, public key cryptography, digital signature, digital certificate, message authentication, hash functions, RSA, ECC, SHA-1, SHA-256, PKI, authentication and key establishment protocols, SSL, PEM, PGP, IPSec, IKE, e-cash, micropayment, SET, electronic voting, electronic auction, smart card, etc.
Credit(s): 3
Prerequisite Course(s): Computer Networks