SECURE SYSTEMS

Giuseppe PERSIANO SECURE SYSTEMS

0222500022
DIPARTIMENTO DI SCIENZE AZIENDALI - MANAGEMENT & INNOVATION SYSTEMS
INFORMATION TECHNOLOGY AND MANAGEMENT
2015/2016

YEAR OF DIDACTIC SYSTEM 2014
PRIMO SEMESTRE
CFUHOURSACTIVITY
636LESSONS
Objectives
KNOWLEDGE AND UNDERSTANDING
THE AIM OF THE COURSE IS TO PRESENT BASIC CRYPTOGRAPHIC PRIMITIVES (ENCRYPTION, AUTHENTICAITON, DIGITAL SIGNATURE, PSEUDO'RANDOM GENERATION) ALONG WITH CURRENT RESEARCH TOPICS AND INDUSTRIAL STANDARDS. THE CLASS WILL ALSO PRESENT THE PRINCIPLES THAT ARE AT THE BASIS OF THE CONSTRUCTIONS OF SUCH PRIMITIVAES IN A RIGOUROUS AND FORMAL WAY. AT THE END OF THE CLASS THE STUDENT WILL ACQUIRE KNOWLEDGE AND METHODLOGY NEEDED TO APPROACH ISSUES RELATIVE TO THE USE OF THE CRYPTOGRAPHIC PRIMITIVES.

APPLYING KNOWLEDGE AND UNDERSTANDING
WHAT ARE THE SECURITY PROPERTIES THAT A CRYPTOGRAPHIC PRIMITIVE MUST SATISFY? THE COURSE WILL PRESENT ALSO THE GENERAL PRINCIPLES THAT DRIVE THE DESIGN OF SECURE CRYPTOGRAPHIC PRIMITIVES. MOREOVER THE STUDENT WILL BE ABLE TO ANSWER QUESTIONS LIKE: WHY DO WE THINK THE PRIMITIVE IS SECURE? CAN WE ACTUALLY PROVE THAT THIS PRIMITIVE IS SECURE? THE STUDENT THAT IS INTERESTED IN DOING RESEARCH IN THIS AREA WILL BE ABLE TO IDENTIFY AND RECOGNIZE THE MAIN RESEARCH CHALLENGES IN THE AREA AND WILL HAVE ACQUIRED THE BACKGROUND NEEDED FOR FUTURE STUDIES.

MAKING JUDGMENTS
STUDENTS ARE TAUGHT TO CRITICALLY CHALLENGE THE MATERIAL PRESENTED DURING THE LECTURES SO TO ENRICH HIS JUDGEMENT CAPABILITIES. THE STUDENT WILL BE ABLE TO DECIDE WHICH FROM A SET OF ALTERNATIVES IS THE PRIMITIVE THAT IS MORE ADEQUATE TO SOLVE A SPECIFIC PROBLEM.

COMMUNICATION SKILLS:
THE STUDENT WILL BE AWARE OF THE ISSUES RELATED TO TE DESIGN OF SECURE CRYPTOGRAPHIC PRIMITIVES AND WILL BE ABLE TO TAKE PART TO GROUP WORK AND TO PRESENT ALSO TO AN UNINFORMED AUDIENCE THE ISSUES RELATED TO THE USE OF SECURE CRYPTOGRAPIC PRIMITIVES.

UNDERSTANDING SKILLS
STUDENTE WILL BE ABLE TO APPROACH IN INDEPENDENT WAY ANY ISSUE RELATED TO THE USE OF SECURE CRYPTOGTAPHIC PRIMITIVES AND WILL BE ABLE TO UNDERSTAND THE FORMAL DESCRIPTION AS WELL AS THE FORMAL SECURITY MODEL ASSOCIATE WITH A PRIMITIVE.
Prerequisites
NO KNOWLEDGE OF SECURITY AND CRYPTOGRAPHY IS ASSUMED.
Contents
PRIVATE KEY ENCRYPTION AND PSEUDORANDOMNESS.
MESSAGE AUTHENTICATION AND COLLISION-RESISTANT HASH FUNCTIONS.
CONSTRUCTION OF BLOCK CIPHERS.
CRYPTANALYSIS OF BLOCK CIPHERS.
PUBLIC KEY ENCRYPTION AND DIGITAL SIGNATURES.
Teaching Methods
CLASSROOM LECTURES.
Verification of learning
ORAL EXAM.
Texts
INTRODUCTION TO MODERN CRYPTOGRAPHY BY KATZ AND LINDELL.
  BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]