The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - Nov.-Dec. (2012 vol.10)
pp: 45-50
Jeffrey T. McDonald , University of South Alabama
Todd R. Andel , University of South Alabama
ABSTRACT
Information assurance (IA) programs are becoming increasingly viable options for computer science and IT students in universities across the US. Although the sophistication of and number of attacks on the cyber domain increase every year, the foundational principles that IA professionals need to learn to advance security and implement new technology remain stable. This article looks at jewels of security education that remain timeless in terms of their teaching value in IA. Secure communication and protocol analysis are key facets of security education, and previous research provides some foundational tenets thereof. These and other jewels give timeless principles to IA professionals for interpreting current practical applications and theoretic limits found in the larger body of security-related research.
INDEX TERMS
Computer security, Public key, Privacy, Information security, Information technology, Quality assurance, career development, information security, education programs
CITATION
Jeffrey T. McDonald, Todd R. Andel, "Integrating Historical Security Jewels in Information Assurance Education", IEEE Security & Privacy, vol.10, no. 6, pp. 45-50, Nov.-Dec. 2012, doi:10.1109/MSP.2012.86
REFERENCES
1. A. Kerckhoffs, “La Cryptographie Militaire,” J. Sciences Militaires, Jan. 1883, pp. 5–83.
2. C.E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Technical J., Oct. 1949, pp. 656–715.
3. E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,” Proc. 17th Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT 99), Springer, 1999, pp. 12–23.
4. M. Blaze, “Protocol Failure in the Escrowed Encryption Standard,” Proc. 2nd ACM Conf. Computer and Comm. Security (CCS 94), ACM, 1994, pp. 59–67.
5. B. Schneier, “Secrecy, Security, and Obscurity,” Crypto-gram Newsletter, Counterpane Internet Security, 15 May 2002; www.schneier.comcrypto-gram-0205.html.
6. W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, Nov. 1976, pp. 644–654.
7. R. Needham and M. Schroeder, “Using Encryption for Authentication in Large Networks of Computers,” Comm. ACM, Dec. 1978, pp. 993–999.
8. R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Feb. 1978, pp. 120–126.
9. D. Dolev and A. Yao, “On the Security of Public Key Protocols,” IEEE Trans. Information Theory, Mar. 1983, pp. 198–208.
10. G. Lowe, “An Attack on the Needham-Schroeder Public-Key Authentication Protocol,” Information Processing Letters, Aug. 1995, pp. 131–133.
11. D. Boneh, R.A. DeMillo,, and R.J. Lipton, “On the Importance of Checking Cryptographic Protocols for Faults,” J. Cryptology, vol. 14, no. 2, 2001, pp. 101–119.
12. P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” Proc. Advances in Cryptology (CRYPTO 99), LNCS 1666, Springer, 1999, pp. 388–397.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool