To see revisions of this document or browse other course outlines, please Log In

Computer Network Security Winter 2025
ECE 628

Published Nov 20, 2024

Class Schedule

Please log in to view this content.

Instructor & TA (Teaching Assistant) Information

Please log in to view this content.

Course Description

ECE 628:

Evolution of computer security. Types of security threats, hardware threats, software threats, physical threats, cryptanalysis. The theory of secure message passing. Methods of encryption, private networks, Data Encryption Standard, Public Key Cryptosystems. Secrecy and Privacy in a network environment, long haul networks, local area networks. Protocols for computer network security.

This course focuses on the  fundamental principles of   computer network security.   The topics to be covered include  practical  symmetric-key and public-key cryptographic schemes,     semantic security,   network and wireless security, detection of relay attacks,   multicast security,   trusted platform,  tamper resistant hardware,  decentralized system security, blockchain and cryptocurrency,    zero-knowledge proofs, blockchain privacy,  privacy enhanced technologies, secure machine learning,   post-quantum cryptography and quantum key distribution.

 

 

Learning Outcomes

By the end of this course students should be able to:
Explain foundational principles of computer network security, including confidentiality, integrity, authentication, trust models, and attack types.
Analyze and implement symmetric and public-key cryptographic schemes, including advanced techniques and their vulnerabilities
Evaluate and apply security protocols for networks, wireless systems, and multicast communications, addressing common attacks.
Develop secure solutions using trusted platforms, tamper-resistant hardware, and countermeasures for physical attacks.
Address security challenges in decentralized systems, including blockchain, cryptocurrencies, and smart contracts.
Acquire practical experience with emerging technologies such secure machine learning and future technology of quantum cryptography.
Build a strong foundation for research or professional work in the field of computer network security.

Tentative Course Schedule

Chapter 1. Basics of Computer Network Security

  • Confidentiality, integrity and authentication
  • Active and passive attacks
  • Basic security protection mechanisms
  • Trust and threat model

Chapter 2. Cryptographic Fundamentals

  • Practical implementation and analysis of symmetric‐key cryptographic schemes, including shift register based pseudorandom generation, AES, SHA, MAC, correlation attacks and time‐memory trade‐off attacks.
  • Public‐key cryptographic schemes, digital signatures, ECC, FHE, fault attacks and side‐channel attacks.
  • Semantic security and CPA/CCA for ensuring robust encryption against adaptive adversaries.

Chapter 3.  Network and Wireless Security

  • Network security protocols (IPsec, TLS/SSL, VPN)
  • Wireless system security (5G radio air link protection, flowed WEP, CCMP)
  • Attacks on TLS
  • Detection relay attacks through physical layer.

Chapter 4. Multicast Security

  • Multicast key distribution
  • Hash chain authentication
  • Merkle tree authentication and commitment.

Chapter 5. Trusted Platform and Hardware Security

  • Trusted platform
  • Tamper resistant hardware and countermeasures against side‐channel and physical attacks
  • Secure storage
  • Remote attestation and anonymous authentication.

Chapter 6. Decentralized System Security

  • Security in peer‐to‐peer and decentralized systems
  • Practical Byzantine fault tolerance
  • Blockchain and cryptocurrency security
  • Consensus mechanisms and smart contract vulnerabilities.

Chapter 7. Zero knowledge proofs and blockchain privacy

  • Zero‐knowledge proofs (ZKPs)
  • Polynomial commitment and sum‐check protocols
  • Mechanisms for achieving secure, private transactions in decentralized networks.

Chapter 8. Privacy Enhanced Technologies

  • Differential privacy
  • Secret sharing and multiparty computation
  • Secure machine learning.

Chapter 9. Post‐quantum and Quantum Cryptography

  • Post‐quantum cryptography
  • NIST PQC standardization progress
  • Quantum key distribution.

 

Texts / Materials

Note: Any prices provided in course outlines are best estimates based on recent online prices and do not include shipping or taxes. Prices may vary between retailers.

No materials required.

There is no textbook for the course, but the following references will be helpful for your reading.

  1. M.T. Goodrich and R. Tamassia, Introduction to Computer Security, Addison Wesley, 2011 (GT11) (Section 3.3, Chapters 6, Sections 9.1, 9.6‐9.7).
  2. L.D. Chen and G. Gong, Communication System Security, CRC, 2012 (CG12).
  3. W. Stallings and L. Brown, Computer Security: Principles and Practice, 4th edition, Pearson, 2017 (Part Five: Chapters 22‐24) (SB17).
  4. J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2nd edition, Chapman and Hall/CRC, 2014 or 3rd edition 2020 (you may read it if you wish to have a deep crypto knowledge for your future career, but not required from the course).
  5. Supplemental materials for the book by Chen‐Gong (SM4CG12), download from LEARN.
  6. ECE 628 Course Notes ‐Available on UW‐LEARN.
  7. Selected papers which will be given during the lectures. 

 

Student Assessment

Component Value
Midterm Examination 30%
Project (both slides and report) due on March 28 30%
Final Examination 40%

The overall grade is based on a midterm exam (take-home exam), one project (individual or 2-person  group)  and one  final exam (open book exam, but only lecture slides are allowed to bring).    For the project, a list of the project problems will be provided.    A 5-8 minutes presentation slides and a report of 5-10 pages in an academic research article format  are a must to obtain the score for the project. The distribution of the marks are shown above.  

 

Assignment Screening

Text matching software (Turnitin) will be used to screen assignments in this course. This is being done to verify that use of all material and sources in assignments is documented. In the first week of the term, details will be provided about the arrangements for the use of Turnitin and alternatives in this course. See Administrative Policy below for more information and links.

Administrative Policy

Generative AI

Generative artificial intelligence (GenAI) trained using large language models (LLM) or other methods to produce text, images, music, or code, like Chat GPT, DALL-E, or GitHub CoPilot, may be used for assignments in this class with proper documentation, citation, and acknowledgement. Recommendations for how to cite GenAI in student work at the University of Waterloo may be found through the Library: https://subjectguides.uwaterloo.ca/chatgpt_generative_ai. Please be aware that generative AI is known to falsify references to other work and may fabricate facts and inaccurately express ideas. GenAI generates content based on the input of other human authors and may therefore contain inaccuracies or reflect biases. 

In addition, you should be aware that the legal/copyright status of generative AI inputs and outputs is unclear. Exercise caution when using large portions of content from AI sources, especially images. More information is available from the Copyright Advisory Committee: https://uwaterloo.ca/copyright-at-waterloo/teaching/generative-artificial-intelligence 

You are accountable for the content and accuracy of all work you submit in this class, including any supported by generative AI. 

University Policy

Academic integrity: In order to maintain a culture of academic integrity, members of the University of Waterloo community are expected to promote honesty, trust, fairness, respect and responsibility. [Check the Office of Academic Integrity for more information.]

Grievance: A student who believes that a decision affecting some aspect of their university life has been unfair or unreasonable may have grounds for initiating a grievance. Read Policy 70, Student Petitions and Grievances, Section 4. When in doubt, please be certain to contact the department’s administrative assistant who will provide further assistance.

Discipline: A student is expected to know what constitutes academic integrity to avoid committing an academic offence, and to take responsibility for their actions. [Check the Office of Academic Integrity for more information.] A student who is unsure whether an action constitutes an offence, or who needs help in learning how to avoid offences (e.g., plagiarism, cheating) or about “rules” for group work/collaboration should seek guidance from the course instructor, academic advisor, or the undergraduate associate dean. For information on categories of offences and types of penalties, students should refer to Policy 71, Student Discipline. For typical penalties, check Guidelines for the Assessment of Penalties.

Appeals: A decision made or penalty imposed under Policy 70, Student Petitions and Grievances (other than a petition) or Policy 71, Student Discipline may be appealed if there is a ground. A student who believes they have a ground for an appeal should refer to Policy 72, Student Appeals.

Note for students with disabilities: AccessAbility Services, located in Needles Hall, Room 1401, collaborates with all academic departments to arrange appropriate accommodations for students with disabilities without compromising the academic integrity of the curriculum. If you require academic accommodations to lessen the impact of your disability, please register with AccessAbility Services at the beginning of each academic term.

Turnitin.com: Text matching software (Turnitin®) may be used to screen assignments in this course. Turnitin® is used to verify that all materials and sources in assignments are documented. Students' submissions are stored on a U.S. server, therefore students must be given an alternative (e.g., scaffolded assignment or annotated bibliography), if they are concerned about their privacy and/or security. Students will be given due notice, in the first week of the term and/or at the time assignment details are provided, about arrangements and alternatives for the use of Turnitin in this course.

It is the responsibility of the student to notify the instructor if they, in the first week of term or at the time assignment details are provided, wish to submit alternate assignment.