B004111-4101-信息安全基础理论与应用

发布者:沈如达发布时间:2018-04-23浏览次数:16

研究生课程开设申请表

 开课院(系、所):信息科学与工程学院

 课程申请开设类型: 新开□     重开     更名□请在内打勾,下同

课程

名称

中文

信息安全基础理论与应用

英文

Basic Theory and Application of Information Security

待分配课程编号

B004101

课程适用学位级别

博士

硕士

总学时

36

课内学时

36

学分

2.0

实践环节

0

用机小时

0

课程类别

公共基础     专业基础     专业必修     专业选修

开课院()

信息科学与工程

学院

开课学期

秋季

考核方式

A. √笔试(开卷   闭卷)      B. 口试    

C.笔试与口试结合                 D. □其他

课程负责人

教师

姓名

胡爱群

职称

教授/博导

e-mail

aqhu@seu.edu.cn

网页地址

http://infosec.seu.edu.cn/

授课语言

汉语

课件地址

http://infosec.seu.edu.cn/课件

适用学科范围

二级

所属一级学科名称

通信与信息系统

实验(案例)个数

0

先修课程

网络与信息安全技术与应用

教学用书

教材名称

教材编者

出版社

出版年月

版次

主要教材

信息安全基础理论与应用

蒋睿、胡爱群等

华中科技大学出版社

200712

1

主要参考书

通信网的安全理论与技术

王育民、刘建伟

西安电子科技大学出版社

20005

2

模式识别

边肇祺、张学工

清华大学出版社

20041

7







一、课程介绍(含教学目标、教学要求等)300字以内)

 本课程面向信息安全专业博士研究生教学,作为其专业必修课程,也可以作为硕士研究生的选修课程。内容包括安全通信、身份认证、公钥基础设施、入侵检测、病毒防护、可信计算、信息隐藏等,涵盖了信息安全研究的主要方面。通过本课程的学习,深入了解信息安全的知识,掌握经典和现代信息安全方法,与信息安全应用相结合,为信息安全科研工作打下基础。

 本课程的先修课程为网络信息安全技术与应用,这是为硕士研究生开设的课程,主要包括经典密码学和模式识别知识、安全协议、数字水印与信息隐藏、网络安全等信息安全基础知识及其应用。

 课程教学以授课和讨论方式想结合,形成互动性学习氛围,促进学生的主动思考,深入领会所学知识。


二、教学大纲(含章节目录):(可附页)


 本课程主要包括密码学与模式识别两大部分,涉及经典的和现代的理论。

 主要章节为:

  1. 信息安全技术概述 (2课时)

 全面阐述信息安全技术涉及的范畴和关键知识点。

  1. 保密通信(6课时)

讲述保密通信系统结构、密码算法、密钥交换协议、保密通信系统安全性分析等。

  1. 非对称密码理论与公钥基础设施(6课时)

 讲述公钥理论基本思想,常见的RSAECC公钥密码算法,数字签名方法,公钥基础设施构件及关键技术等。

  1. 信息隐藏与数字水印(6课时)

阐述信息隐藏的指导思想,常见信息隐藏方法,包括时间域、变换域等,阐述信息隐藏如何用于隐蔽通信,隐藏信息的检测与分离方法;数字水印的生成与攻击方法等。

  1. 病毒与防护(4课时)

阐述计算机病毒、网络病毒的产生、传播机理,以及如何检测病毒,保护信息系统免受感染等。

  1. 可信计算(4课时)

阐述可信计算的目标,可信根的建立,可信链,信任的传递,以及如何基于信任链构建信息系统的安全防护体系等。介绍远程可信的基本思想。        

  1. 模式识别与信息安全(4课时)

介绍模式识别的基本知识,贝叶斯分类理论,特征选择与提取方法,聚类方法,分类方法等。阐述模式识别在生物特征识别、病毒检测、入侵防范方面的应用。        

  1. 信息安全应用与发展(2课时)

阐述信息安全技术在计算机安全、网络安全、信息系统安全等方面的应用,信息安全技术的未来发展趋势等。



三、教学周历

 周次

 教学内容

 教学方式

1

 信息安全技术概述

 讲课

2

 保密通信

 讲课

3

 保密通信

 讲课

4

 保密通信

 讨论

5

 非对称密码理论与公钥基础设施

 讲课

6

 非对称密码理论与公钥基础设施

 讲课

7

 非对称密码理论与公钥基础设施

 讨论

8

 信息隐藏与数字水印

 讲课

9

 信息隐藏与数字水印

 讲课

10

 信息隐藏与数字水印

 讨论

11

 病毒与防护

 讲课

12

 病毒与防护

 讨论

13

 可信计算

 讲课

14

 可信计算

 讨论

15

 模式识别与信息安全

 讲课

16

 模式识别与信息安全

 讨论

17

 信息安全应用与发展

 讨论

18

 考试

 考试


四、主讲教师简介:

 胡爱群,男,196511生。现任东南大学信息科学与工程学院教授、博士生导师,信息安全学科负责人,东南大学信息安全中心主任。中国通信学会高级会员,《通信学报》编委,教育部信息安全类教学指导委员会成员,国家242信息安全计划专家组成员,863计划信息安全主题专家组成员(2001-2006),信息安全国家重点实验室学术委员会委员。IEEE Member

 近几年来,主要研究无线网络安全技术,在IEE Electronics Letters 等杂志共发表高质量学术论文50多篇,其中SCI收录4篇,EI收录30多篇。共主持完成或参与国家863计划项目、115基金项目、242信息安全计划项目以及企业委托项目等科研项目30多项,共申请发明或实用新型专利28项,其中已授权发明专利10项(已授权美国专利2项),已授权实用新型专利2项,登记软件著作权3项。


五、任课教师信息(包括主讲教师):

 任课

 教师

 学科

 (专业)

 办公

 电话

 住宅

 电话

 手机

 电子邮件

 通讯地址

 邮政

 编码

 胡爱群

 通信与信息系统

 (信息安全)

025-

83795112-

808



aqhu@seu.edu.cn

 南京市四牌楼2

 东南大学信息安全研究中心

210096









Application Form For Opening Graduate Courses

School (Department/Institute)School of Information Science and Engineering

Course Type: New Open □   Reopen    Rename □Please tick in □, the same below

Course Name

Chinese

信息安全基础理论与应用

English

Basic Theory and Application of Information Security

Course Number

B004101

Type of Degree

Ph. D

Master

Total Credit Hours

36

In Class Credit Hours

36

Credit

2.0

Practice

0

Computer-using Hours

0

Course Type

Public Fundamental    □Major Fundamental     Major Compulsory     □Major Elective

School (Department)

School of Information Science and Engineering

Term

Autumn

Examination

A. √PaperOpen-book Closed-bookB. □Oral   

C. □Paper-oral Combination                       D. □ Others

Chief

Lecturer

Name

HU AIQUN

Professional Title

Professor

E-mail

aqhu@seu.edu.cn

Website

http://infosec.seu.edu.cn

Teaching Language used in Course

Chinese

Teaching Material Website

http://infosec.seu.edu.cn

Applicable Range of Discipline

second-class discipline

Name of First-Class Discipline

Communication and Information Engineering

Number of Experiment

0

Preliminary Courses

Technology and Application of Network and Information Security

Teaching Books

Textbook Title

Author

Publisher

Year of Publication

Edition Number

Main Textbook

Basic Theory and Application of Network and Information Security

RI JIANG,HU AQIUN,etc.

Press of Hua Zhong Science and Technology University

2007

1

Main Reference Books

Communication Network SecurityTheory and Techniques

Wang Yumin,Liu Jianwei

Xian Dianzi Univ. Press

2000


2


Pattern Recognition

Bian Zhaoqi, Zhang Xuegong


Tsinghua University Press


2004


7







  1. Course Introduction (including teaching goals and requirements) within 300 words:

This course is for doctoral student study in information security specialty, typically for their compulsory course. It can also be chosen for further study by graduate students who are interested in information security research. This course mainly includes secure communications, identity authentication, public key infrastructure, inbreak detection, virus prevention, trusted computing, and information hiding, etc.. It covers almost every aspect of modern information security knowledge. By studying this course, students will know more about information security depth, grasp classical and advanced information security methods, and build up good foundation for future research work.


  1. Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):

This course mainly includes two parts: cryptology and pattern classification. It deals with both classical and advanced theory of information security. The chapters are:

Chapter 1 Summary of Information Security Technology (2 hours)

This chapter introduces the scope and key knowledge of information security.

Chapter 2 Secure Communications6 hours

This chapter tells the structure of communications system, cryptology algorithms, key exchangement protocols, and their performance analysis.

Chapter 3 Asymmetrical Cryptology Theory and Public Key Infrastructure (6 hours)

This chapter gives the basic idea of the public key theory, including the common used RSA/ECC algorithms and digital signature methods. And then presents the components of Public Key Infrastructure.

Chapter 4 Information Hiding and Digital Watermark6 hours

This chapter deals with the main methods of information hiding, including time domain and transform domain methods, proposes how to do concealment communications, detection of hiding information, and how to generate robust watermark.

Chapter 5 Virsus and Computer Protection4 hours

This chapter introduces the transporting mechanism of computer and internet virsus, and how to detect them so as to protect the information system from being infected.

Chapter 6 Trusted Computing4 hours

This chapter expatiates on the goal of trusted computing and how to build up the trust root and trust link and how to set up secure protection architecture based on the trusted computing system. The remote trust idea is also involved in this chapter.       

Chapter 7 Pattern Classification and Information Security (4 hours

This chapter introduces basic technology of pattern classification, including Bayes Classification Theory, Feature Selection and Extraction, clustering methods and classifying approaches. After that, this chapter discusses application of pattern classification in Biological Feature Recognition, Virsus Detection and Intruding Defense.       

Chapter 8 Application of Information Security Technology 2 hours

This chapter gives the main application of Information Security Technology, and the trend of it.

  1. Teaching Schedule:

Week

Course Contents

Teaching Method

1

Summary of Information Security Technology

lecture

2

Secure Communications

lecture

3

Secure Communications

lecture

4

Secure Communications

Discussion

5

Asymmetrical Cryptology Theory and Public Key Infrastructure

lecture

6

Asymmetrical Cryptology Theory and Public Key Infrastructure

lecture

7

Asymmetrical Cryptology Theory and Public Key Infrastructure

Discussion

8

Information Hiding and Digital Watermark

lecture

9

Information Hiding and Digital Watermark

lecture

10

Information Hiding and Digital Watermark

Discussion

11

Virsus and Computer Protection

lecture

12

Virsus and Computer Protection

Discussion

13

Trusted Computing

lecture

14

Trusted Computing

Discussion

15

Pattern Classification and Information Security

lecture

16

Pattern Classification and Information Security

Discussion

17

Application of Information Security Technology

Discussion

18

Examination

Closed book

Note: 1.Above one, two, and three items are used as teaching Syllabus in Chinese and announced on the Chinese website of Graduate School. The four and five items are preserved in Graduate School.

2. Course terms: Spring, Autumn , and Spring-Autumn term.  

3. The teaching languages for courses: Chinese, English or Chinese-English.

4. Applicable range of discipline: public, first-class discipline, second-class discipline, and third-class discipline.

5. Practice includes: experiment, investigation, research report, etc.

6. Teaching methods: lecture, seminar, practice, etc.

7. Examination for degree courses must be in paper.

8. Teaching material websites are those which have already been announced.

9. Brief introduction of chief lecturer should include: personal information (date of birth, gender, degree achieved, professional title), research direction, teaching and research achievements. (within 100-500 words)


  1. Brief Introduction of Chief lecturer:

Mr. Aiqun HU was born in 1965. He is an IEEE member now. He received Bachelor’s Degree, Master’s Degree and PH.D Degree from Southeast University in 1987,1990 and 1993 respectively. He was invited as a post-doc research fellow in The University of Hong Kong from 1997 to 1998, and TCT fellow in Nanyang Technological University in 2006. His research interests are mainly in data transmission and secure communication technology. He had ever been one of experts of the national high technology programme (863) in China from 2001-2006. He has published two books and over 100 technical papers, and owns 30 patens in wireless communications and information security.


  1. Lecturer Information (include chief lecturer)


Lecturer

Discipline

(major)

Office

Phone Number

Home Phone Number

Mobile Phone Number

Email

Address

Postcode

HU AIQUN

Information Security

025 83795112 ext. 808



aqhu@seu.edu.cn

North Room 426,

LI Wenzheng Building,

Southeast University

210096


9