2005 UTHF Pre-Conference Tutorial Sessions

Host: NATEA Silicon Valley Chapter

Time: Saturday 10/15/05, 1-5 pm
Place: Los Altos Library,
13 S. San Antonio Road, Los Altos, CA 94022
(650) 948-7683
Fee: Free admission, Please RSVP at UTHFtutorial.dyndns.org

Contact: Dr. John Huang (650)533-5197, Symon Chang(510)798-1712


1. Data Encryption and Wireless Security, by Dr. Tim Lin (林洪權), Electrical and Computer Engineering department, California State Polytechnic University, Pomona.
2. The Ways to Secure Database, by Dr. Tian Zhang (張恬), Manager, Federated Runtime Team, Websphere Information Integration, IBM Silicon Valley Lab.
3. Introduction of IPSec VPN, by Tom Hu (胡東海), Senior Security Engineer Staff, CISCO.


Topic 1:  Data Encryption and Wireless Security By Dr. Tim Lin, Electrical and Computer Engineering department, California State Polytechnic University, Pomona
Abstract: RSA (Rivest, Shamir, and Adelman) is an asymmetric cipher algorithm for encryption using public / private key pairs. It uses number theory and modulo
arithmetic, is easy to implement, but very hard to break by brute force (there is the so called RSA challenge numbers). ECC (Elliptic Curve Cryptography) uses cubic curve of polynomials of third order and also modulo arithmetic for encryption and decryption (the addition operation in ECC is the counterpart of modular multiplication in RSA).
Implementation in computer programming (C / C++, Java, C# etc.) needs to consider HUGE integer type and hence is very different from the common programming using int type of 4 bytes or 31 bits signed integer. Wireless communication distinguishes itself basically from wired communication (such as LAN) in that it is open space subject to attack from
anybody around. Hence encryption and decryption is the first thing. 802.11security (plus security of some other wireless protocols) will be covered.
Biography: Dr. Tim Lin (Lin, Hong-Chuan) got BS degree in Electrical Engineering from National Taiwan University and Ph.D. in Mathematics from CalTech. He has been
working in software industry since 1981 in communications, aerospace, and printing. He joined the ECE (Electrical and Computer Engineering) department of Cal
Poly Pomona since fall 2001. He instructs courses in Network Security, TCP/IP, Operating Systems, and many other theoretical and practical courses, including Data Structures, C++ / Java programming and Verilog. He was born in I-Lan prefecture, Taiwan and he is proud of his homeland and his home town.


Topic 2:  The Ways to Secure Database, by Dr. Tian Zhang, Manager, Federated Runtime Team, Websphere Information Integration, IBM Silicon Valley Lab.
Abstract: With the world wide emphasis on security, more and more government or corporate information security officers are pressed to ensure their databases are properly secured. All of a sudden, the market expects the database products are aligned up with the required security features. In this talk, we will examine the various database security issues and share with you the latest security features available that include identity management, authentication, authorization, audit, encryption, and data integrity. At the end we will also talk about the common criteria certification that has been adopted internationally for security assurance.
Biography: Dr. Tian Zhang earned her Ph.D. in Database from University of Wisconsin-Madison in 1996. She joined IBM afterwards and over the years she has led the design and implementation of many important features of DB2 Federated, such as federated query rewrite, query pushdown analysis, trusted/fenced wrapper architecture, and parallelism model. Her latest assignment in IBM is security architect for DB2 Federated product and manager for DB2 Federated runtime team. She is responsible for laying out the security roadmap and driving the roadmap into the product.


Topic 3:  Introduction of IPSec VPN, by Tom Hu, Senior Security Engineer Staff, CISCO.
Abstract: After Internet becomes a persuasive technology to replace the traditional high cost least line, IPsec VPN is getting to play very important role on security. IPsec and IKE are two important IETF standards to implement VPN network.

This tutorial will cover:
1. What is VPN (virtual private network)?
2. Some IP security buzz words
3. IP security Key exchange management
    - For negotiating various IPSec option, authenticating the Ipsec nodes and managing the session keys for Ipsec
4. IP security concept
    - Authentication Header (AH)
    - Encapsulating Security Payload (ESP)
    - Tunnel and transport mode

Biography: Tom Hu is senior security engineer staff at CISCO and responsible for development of next generation VPN product. He is a security expert and has 6 years of experience in IPsec VPN design. Tom holds MS degree in Electrical Engineering from University of New Mexico.


Presented By:
     North America Taiwanese Engineers’ Association (NATEA),

Silicon Valley Chapter


Sponsored By:
     TECO-SF Science & Technology Division, National Science Council



Co-sponsored By:
Industrial Development Bureau (IDB), Ministry of Economic Affairs (MOEA)

Institute for Information Industry (III)

Industry Technology Research Institute (ITRI)