CS 1653 - Applied Cryptography and Network Security

Summer 2023

 

Contact Information

Instructor

 

 

Office Hours

Sherif Khattab, 6307 SENSQ

(412) 624-8438

skhattab@cs.pitt.edu

TuTh: 13:00 pm-15:00 pm

Zoom: https://pitt.zoom.us/my/khattab

Please schedule at: https://khattab.youcanbook.me/

Other days and times are available by prior request

TA

 

 

 

Office Hours

Pratik Musale, 130 N Bellfield Ave (Open Space)

prm73@pitt.edu

 

M: 10:30-12:30

Zoom: https://pitt.zoom.us/j/96317619602

Lectures

 

MW 13:30-15:30 @ 5313 Sennott Square

Student Feedback

Please send us your anonymous feedback

Top Hat Join Code

246844

 

Course Description

 

The goal of this course is to provide students with the necessary conceptual background and hands-on experience to understand the most common cryptographic algorithms and protocols and how to use them to secure distributed applications and computer networks.

 

Prerequisites

 

 

CS 0449 and CS 1501

 

Textbook

 

 

Bishop: Matt Bishop, Computer Security: Art and Science (2nd Edition), Addison-Wesley, ISBN-13: 9780321712332

Stallings: William Stallings and Lawrie Brown, Computer Security: Principles and Practice (4th Edition), Pearson, ISBN-13: 9780134794105

 

Optional references:

1.      KPS: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World (2nd Edition), Prentice Hall, ISBN-10: 0133744051

2.      Ross Anderson, Security Engineering, Wiley

3.      Charles Pfleeger and Shari Lawrence Pfleeger, Security in Computing, Prentice Hall

4.      Schneier: Bruce Schneier, Applied Cryptography (2nd Edition), Wiley

5.      John Viega and Gary McGraw, Building Secure Software, Addison-Wesley

Grading Policy

 

Course Project (35%): This semester, we will apply the concepts learned in class through a semester-long project that will be carried out in groups of 3. The project will be split into five distinct phases that refine and build upon one another. Tentative deadlines are listed below. Late submissions will not be accepted. There will be meetings with me and the TA to discuss the deliverables before and after submission.

 

The project deliverables must be your own team's work. Do not look at the solution of any other team (or even part of it), and do not let anyone else look at yours (or even part of it). Each team should figure out the solutions by themselves --- do not ask anyone how to solve the project, and do not seek the answer from some other source.

 

Midterm and Final exams (30%): 18% on higher grade and 12% on lower. Make-up exams can be scheduled well in advance. The exams are in-person and non-cumulative.

 

Programming Assignments (15%): Three programming assignments worth 5% each. Late submissions are allowed for up to two days with a 10% reduction per late day. After two days, the assignment grade is zero. The assignments will be handed out using Github Classroom and submitted on the Gradescope platform.

 

This must be your own individual work. Do not look at the solution of anyone (or even part of it), and do not let anyone else look at yours (or even part of it). You should figure out the solutions by yourself --- do not ask anyone how to solve the problem, and do not seek the answer from some other source.

 

Students are expected to have a backup disk (or storage somewhere) for every assignment they turn in. In this way, if there is any problem with the copy that is handed in the backup can be used for grading purposes.

 

Homework Assignments (10%): Ten homework assignments worth 1% each. Late submissions are allowed with a 10% reduction per late day.

 

In-class participation (10%): Tophat questions almost every lecture. The join code is 246844.

 

Please note that the grades posted on Canvas, especially the final letter grade, are tentative.

Important Dates (Tentative)

 

Midterm Exam

M 7/3 at regular class time

Final Exam

W 8/2 at regular class time

 

Project Phase #

Description

Assigned

Due @11:59 on

1 (10%)

Requirements specification and team formation

5/24

6/6

2 (25%)

Core functionality

6/6

6/27

3 (25%)

Security Features I

6/27

7/14

4 (25%)

Security Features II

7/7

7/28

5 (15%)

Security Features III

7/28

8/7

 

HW #

Assigned

Due @11:59 on

1

5/19

5/26

2

5/26

6/2

3

6/2

6/9

4

6/9

6/16

5

6/16

6/23

6

6/23

7/7

7

7/7

7/14

8

7/14

7/21

9

7/21

7/28

10

7/28

8/4

 

Programming Assignment #

Assigned

Due @11:59 on

1

5/26

6/6

2

6/12

6/23

3

7/10

7/24

 

Weekly Schedule

(Tentative)

 

Week

Topic

Reading

Announcements

Wk 1 (5/15)

M: Administrivia and course introduction

W: Design Principles

 

 

W: [SS75] pp. 1279-1283 and Stallings 1

 

 

 

 

Wk 2 (5/22)

M: Cryptography basics and classical cryptography

W: Symmetric key cryptography, modes of operation

M: Bishop 10.1, 10.2.1-10.2.2.

Stallings 2.1 and 20.6

 

W: Stallings 20.1, 20.2, and 20.5

Summer 12-WEEK session add/drop period ends on May 22nd

Project Phase 1 out on 5/26

Wk 3 (5/29)

M: No class - Memorial Day

W: Case study: AES

M: Stallings 20.3

W: Stallings 2.2 and 21.1-21.3

Wk 4 (6/5)

M: Hashing

W: Public key cryptography background

M: Stallings 2.3 and 2.4

W: Stallings 21.4 and 21.5

Project Phase 1 due on 6/6 @ 11:59pm

Project Phase 2 out on 6/6

Wk 5 (6/12)

M: No class - Instructor travelling

W: Case Study: RSA

F: RSA wrap-up; secret sharing

M: [S79]

W: Schneier 3.7

Makeup lecture on Friday 6/16 11:00-12:45 @ 5313 Sennott Square

Wk 6 (6/19)

M: No class - Juneteenth

W: Threshold cryptography; User authentication

F: Handshakes

KPS 11, 12

Optional: [L81]

 

W: Stallings 23.1

Makeup lecture on Friday 6/23 15:00-16:15 @ 5313 Sennott Square

Wk 7 (6/26)

M: Handshakes

W: Strong password protocols

W: Stallings 23.1

Project Phase 2 due on 6/27 @ 11:59pm

Project Phase 3 out on 6/27

Wk 8 (7/3)

M: Midterm Exam + Kerberos

W: PKI models and Real-time communication security

M: Stallings 23.3

Midterm Exam on Monday 7/3

Wk 9 (7/10)

M: TLS

W: Case study: Breaking MD5

M: Stallings 22.3 and 22.4

W: Optional: [SS+08]

Project Phase 3 due on 7/14 @ 11:59pm

Project Phase 4 out on 7/14

Wk 10 (7/17)

M: Breaking Cryptography

W: ACLs and capabilities

M: Optional: [WT99]

Wk 11 (7/24)

M: OS security and viruses

W: Private messaging and email

M: [AO96], [S89]

W: Stallings 22.1 and 22.2

Project Phase 4 due on 7/28 @ 11:59pm

Project Phase 5 out on 7/28

Wk 12 (7/31)

M: Private routing

W: Final Exam + Blockchain and Cryptocurrency

 

W: [S02], Optional: [O09]

Final Exam on Wednesday 8/2

Project Phase 5 due on 8/7 @ 11:59pm

Other Readings

 

Communication Policy

 

Please reach out to the teaching team as early as possible and as frequently as possible. You can reach the course instructor during student support hours and on Piazza (you can send public and private messages. You can also post anonymously).

Please expect a response within 72 hours. Any other communication method (e.g., email) is not recommended.

Your Well-being Matters

College/Graduate school can be an exciting and challenging time for students. Taking time to maintain your well-being and seek appropriate support can help you achieve your goals and lead a fulfilling life. It can be helpful to remember that we all benefit from assistance and guidance at times, and there are many resources available to support your well-being while you are at Pitt. You are encouraged to visit Thrive@Pitt to learn more about well-being and the many campus resources available to help you thrive. 

 

If you or anyone you know experiences overwhelming academic stress, persistent difficult feelings and/or challenging life events, you are strongly encouraged to seek support. In addition to reaching out to friends and loved ones, consider connecting with a faculty member you trust for assistance connecting to helpful resources. 

 

The University Counseling Center is also here for you. You can call 412-648-7930 at any time to connect with a clinician. If you or someone you know is feeling suicidal, please call the University Counseling Center at any time at 412-648-7930. You can also contact Resolve Crisis Network at 888-796-8226. If the situation is life threatening, call Pitt Police at 412-624-2121 or dial 911.

 

Health and Safety Statement

I would like to emphasize that my number one concern is your safety and health, both physical and mental.  My goal is for every one of you to succeed in the course. I am here to support you and I will remain understanding and flexible given the challenges that we are all facing together. The lectures and some recitations will be recorded, and the recorded sessions include your participation. The recorded sessions will be made available through Canvas and only to this term's class.

 

During this pandemic, it is extremely important that you abide by the public health regulations, the University of Pittsburgh'health standards and guidelines, and Pitt's Health Rules. These rules have been developed to protect the health and safety of all of us. The University's requirements for face coverings will at a minimum be consistent with CDC guidance and masks are required indoors (campus buildings and shuttles) on campuses in which COVID-19 Community Levels are High. This means that when COVID-19 Community Levels are High, you must wear a face covering that properly covers your nose and mouth when you are in the classroom. If you do not comply, you will be asked to leave class. It is your responsibility to have the required face covering when entering a university building or classroom. Masks are optional indoors for campuses in which county levels are Medium or Low. Be aware of your Community Level as it changes each Thursday. Read answers to frequently asked questions regarding face coverings. For the most up-to-date information and guidance, please visit the Power of Pitt site and check your Pitt email for updates before each class.

If you are required to isolate or quarantine, become sick, or are unable to come to class, contact me as soon as possible to discuss arrangements. Arrangements include, but are not limited to, providing a Zoom link to join class remotely.

 

Students with Disabilities

 

If you have a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and Disability Resources and Services (DRS), 140 William Pitt Union, (412) 648-7890, drsrecep@pitt.edu, (412) 228-5347 for P3 ASL users, as early as possible in the term. DRS will verify your disability and determine reasonable accommodations for this course.

Academic Integrity


All assignment submissions must be the sole work of each individual student. Students may not read or copy another student's solutions or share their own solutions with other students. Students may not review solutions from students who have taken the course in previous years. Submissions that are substantively similar will be considered cheating by all students involved, and as such, students must be mindful not to post their code publicly. The use of books and online resources is allowed, but must be credited in submissions, and material may not be copied verbatim. Any use of electronics or other resources during an examination will be considered cheating. If you have any doubts about whether a particular action may be construed as cheating, ask the instructor for clarification before you do it. The instructor will make the final determination of what is considered cheating. Cheating in this course will result in a grade of F for the course and may be subject to further disciplinary action. Should a student be accused of a breach of academic integrity or have questions regarding faculty responsibilities, procedural safeguards including provisions of due process have been designed to protect student rights. These may be found in Guidelines on Academic Integrity: Academic Integrity Policy of the School of Computing and Information.

Pay attention to the following examples of cheating, which include:

Sharing code: either by copying, retyping, looking at, or supplying a copy of a file from this or a previous semester.

Describing code: Verbal description of code from one person to another.

Coaching: Helping your friend to write a lab, line by line.

Copying: Copying code from the Web or another student. You are only allowed to use code that we provide you.

Searching: Searching the Web for solutions or for any advice on the lab.


Cheating is also looking at other students' code or allowing others to look at yours. This includes one person looking at code and describing it to another. Be sure to store your work in protected directories (e.g., under the private folder on your AFS space on the department servers), and log off when you leave a remote server, to prevent others from copying your work without your explicit assistance.

You may find it useful to know what is not cheating:

Clarifying ambiguities or vague points in class handouts, lectures, or textbooks.

Helping others use the computer systems, networks, compilers, debuggers, profilers, or other system facilities.

Helping others with high-level design issues only, but algorithm/coding and other such details are not ``high-level design issues''.

Helping others with high-level (not code-based) debugging.

Using code from the skeleton/package provided in class is always OK.

For a first offense, a student caught collaborating or cheating in any way will receive an F for the course and may be subject to stronger action. They will be reported to the school following University procedures. Submissions that are alike in a substantive way (not due to coincidence) will be considered to be cheating by ALL involved parties. Please protect yourselves by only storing your files in private directories, and by retrieving all printouts promptly.

Religious Observances


To accommodate the observance of religious holidays, students should inform the instructor (by email, within the first two weeks of the term) of any such days which conflict with scheduled class activities.

Equity, Diversity, and Inclusion

The University of Pittsburgh does not tolerate any form of discrimination, harassment, or retaliation based on disability, race, color, religion, national origin, ancestry, genetic information, marital status, familial status, sex, age, sexual orientation, veteran status or gender identity or other factors as stated in the University's Title IX policy. The University is committed to taking prompt action to end a hostile environment that interferes with the University's mission. For more information about policies, procedures, and practices, visit the Civil Rights & Title IX Compliance web page.

I ask that everyone in the class strive to help ensure that other members of this class can learn in a supportive and respectful environment. If there are instances of the aforementioned issues, please contact the Title IX Coordinator, by calling 412-648-7860, or e-mailing titleixcoordinator@pitt.edu. Reports can also be filed online. You may also choose to report this to a faculty/staff member; they are required to communicate this to the University's Office of Diversity and Inclusion. If you wish to maintain complete confidentiality, you may also contact the University Counseling Center (412-648-7930).

 

Copyright Statement

 

These materials may be protected by copyright. United States copyright law, 17 USC section 101, et seq., in addition to University policy and procedures, prohibit unauthorized duplication or retransmission of course materials. See Library of Congress Copyright Office and the University Copyright Policy.

 


Classroom Recording

 

 

To ensure the free and open discussion of ideas, students may not record classroom lectures, discussion and/or activities without the advance written permission of the instructor, and any such recording properly approved in advance can be used solely for the student's own private use.

 

Acknowledgements

 

Most of the materials of this course are based on Prof. Adam Lee's CS 1653 course.