## ICSI-660/445 Theory and Practice of Security and Privacy## 2014 Fall TermAnnouncements · Course Objectives · Evaluation · Lectures Notes · Term Paper · Project · Assignments · Recommended Study Material |

Instructor: Pradeep K. Atrey Office: LI 096C Class Meeting Time: Mondays, Wednesdays 4:15 p.m. - 5:35 p.m. Class Room: BB0213 Office Hours: Mondays, Wednesdays 2:00 p.m. - 4:00 p.m. and By appointment Email: first letter of first name plus last name at albany dot edu |

- Two term tests (20%)
- Term paper (10%)
- Project (30%)
- Final exam (40%)

- Two term tests (20%)
- Term paper (10%)
- Two assignments (30%)
- Final exam (40%)

Week # (Dates) | Topics | Reading List | |

Sep 3 | Introduction to the Course | ||

Sep 8 & 10 | Overview & Classical cryptography | R1.1 (except R1.1.3, R1.1.4, R1.1.6) & T.2, Univ. of Rhodes - Notes | |

Sep 15 & 17 | Block ciphers, DES and AES, and Modes of operation | T.3, T.5 (except 5.1, 5.6), T.6 (except 6.7) Univ. of Rhodes - Notes | |

Sep 22 | Basic concepts in Number Theory and Modular Arithmetic | T.(4.1, 4.2, & 4.3) & T.(8.1, 8.2) | |

Sep 29, Oct 1 & 6 | Public Key Cryptography 1 (RSA and D-H Key Exchange) & Public Key Cryptography 2 (Message Authentication, Hash Functions and DSS) | T.9 (including Appendix 9A) & T.10.1; T.11 (except 11.6), T.12 (except 12.6, 12.7, 12.8), T.13 (except 13.2, 13.3) | |

Oct 8 | Term test #1 | -- | |

Oct 13, 15 & 20 | Shamir's Secret Sharing and Homomorphism - Secure cloud-based data processing | Secret Sharing (Web source), Board scraps | |

Oct 22 | Term paper presentations | - | |

Oct 27 & 29 | Multimedia Security | Web link | |

Nov 3 & 5 | Privacy Preserving Techniques - Overview & Statistical Disclosure Control & No class on Nov. 5 | Statistical Methods for Privacy Protection (Sec 3.1-3.4) | |

Nov 10 | Term test #2 | - | |

Nov 12 | Review of Term Test #2 and Statistical Disclosure Control (Cont...) | - | |

Nov 17 | Privacy Preserving Data Mining | k-Anonymity, l-Diversity, t-Closeness | |

Nov 19 | Privacy in Video Surveillance | Paper1, Paper2 | |

Nov 20 (makeup class for Nov 5) | Privacy in Social Networks | Paper | |

Nov 25 & Dec 1 | Multimedia Surveillance for Homeland Security | -- | |

Dec 3 | Course Review and Tips on Final Exam | -- | |

Dec 8, 2:40-4:00 p.m. (LI 98) & 4:15-5:35 p.m. (BB 213) | Project presentations | -- |

- Project proposal: due on September 22, 2014, 11:59 p.m. The topics of potential projects can be found here.
- Sample final reports can be found here: [Implementation] and [Survey]
- List of approved projects can be found here.
- Final project submission due on December 8, 2014, 12:00 noon.
- Project demonstrations will be held on December 8, 2014 in LI 98 and BB 213. Demo schedule can be found here.

- Assignment #1 (Symmetric and asymmetric encryption): due on October 3, 2014, 11:59 p.m.
- Assignment #2 (Secret sharing): due on November 10, 2014, 11:59 p.m.

Cryptography and Network Security: Principles and Practice, 5/E, by William Stallings, Prentice Hall, ISBN-10: 0136097049, ISBN-13: 9780136097044

Besides the information contained in the textbook, the appropriate material and examples will also be taken from other sources. Students are responsible for all material covered in the class.

Reference Books

- R1: Computer Security: Principles and Practice. William Stallings and Lawrie Brown. 2nd edition, Pearson/Prentice Hall ISBN-10: 0136004245, ISBN-13: 9780136004240
- R2: Security in Computing, By Charles P. Pfleeger, Shari Lawrence Pfleeger, Prentice Hall PTR, 2003 ISBN 0130355488, 9780130355485
- R3: Introduction to Computer Security, By Matt Bishop, Addison-Wesley, Published 2004 ISBN 032124744
- R4: Cryptography: Theory and Practice, By Douglas Robert Stinson, CRC Press, 2006 ISBN 1584885084, 9781584885085