Giuseppe PERSIANO | SECURE SYSTEMS
Giuseppe PERSIANO SECURE SYSTEMS
cod. 0222500022
SECURE SYSTEMS
0222500022 | |
DIPARTIMENTO DI SCIENZE AZIENDALI - MANAGEMENT & INNOVATION SYSTEMS | |
INFORMATION TECHNOLOGY AND MANAGEMENT | |
2015/2016 |
YEAR OF DIDACTIC SYSTEM 2014 | |
PRIMO SEMESTRE |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 6 | 36 | LESSONS |
Objectives | |
---|---|
KNOWLEDGE AND UNDERSTANDING THE AIM OF THE COURSE IS TO PRESENT BASIC CRYPTOGRAPHIC PRIMITIVES (ENCRYPTION, AUTHENTICAITON, DIGITAL SIGNATURE, PSEUDO'RANDOM GENERATION) ALONG WITH CURRENT RESEARCH TOPICS AND INDUSTRIAL STANDARDS. THE CLASS WILL ALSO PRESENT THE PRINCIPLES THAT ARE AT THE BASIS OF THE CONSTRUCTIONS OF SUCH PRIMITIVAES IN A RIGOUROUS AND FORMAL WAY. AT THE END OF THE CLASS THE STUDENT WILL ACQUIRE KNOWLEDGE AND METHODLOGY NEEDED TO APPROACH ISSUES RELATIVE TO THE USE OF THE CRYPTOGRAPHIC PRIMITIVES. APPLYING KNOWLEDGE AND UNDERSTANDING WHAT ARE THE SECURITY PROPERTIES THAT A CRYPTOGRAPHIC PRIMITIVE MUST SATISFY? THE COURSE WILL PRESENT ALSO THE GENERAL PRINCIPLES THAT DRIVE THE DESIGN OF SECURE CRYPTOGRAPHIC PRIMITIVES. MOREOVER THE STUDENT WILL BE ABLE TO ANSWER QUESTIONS LIKE: WHY DO WE THINK THE PRIMITIVE IS SECURE? CAN WE ACTUALLY PROVE THAT THIS PRIMITIVE IS SECURE? THE STUDENT THAT IS INTERESTED IN DOING RESEARCH IN THIS AREA WILL BE ABLE TO IDENTIFY AND RECOGNIZE THE MAIN RESEARCH CHALLENGES IN THE AREA AND WILL HAVE ACQUIRED THE BACKGROUND NEEDED FOR FUTURE STUDIES. MAKING JUDGMENTS STUDENTS ARE TAUGHT TO CRITICALLY CHALLENGE THE MATERIAL PRESENTED DURING THE LECTURES SO TO ENRICH HIS JUDGEMENT CAPABILITIES. THE STUDENT WILL BE ABLE TO DECIDE WHICH FROM A SET OF ALTERNATIVES IS THE PRIMITIVE THAT IS MORE ADEQUATE TO SOLVE A SPECIFIC PROBLEM. COMMUNICATION SKILLS: THE STUDENT WILL BE AWARE OF THE ISSUES RELATED TO TE DESIGN OF SECURE CRYPTOGRAPHIC PRIMITIVES AND WILL BE ABLE TO TAKE PART TO GROUP WORK AND TO PRESENT ALSO TO AN UNINFORMED AUDIENCE THE ISSUES RELATED TO THE USE OF SECURE CRYPTOGRAPIC PRIMITIVES. UNDERSTANDING SKILLS STUDENTE WILL BE ABLE TO APPROACH IN INDEPENDENT WAY ANY ISSUE RELATED TO THE USE OF SECURE CRYPTOGTAPHIC PRIMITIVES AND WILL BE ABLE TO UNDERSTAND THE FORMAL DESCRIPTION AS WELL AS THE FORMAL SECURITY MODEL ASSOCIATE WITH A PRIMITIVE. |
Prerequisites | |
---|---|
NO KNOWLEDGE OF SECURITY AND CRYPTOGRAPHY IS ASSUMED. |
Contents | |
---|---|
PRIVATE KEY ENCRYPTION AND PSEUDORANDOMNESS. MESSAGE AUTHENTICATION AND COLLISION-RESISTANT HASH FUNCTIONS. CONSTRUCTION OF BLOCK CIPHERS. CRYPTANALYSIS OF BLOCK CIPHERS. PUBLIC KEY ENCRYPTION AND DIGITAL SIGNATURES. |
Teaching Methods | |
---|---|
CLASSROOM LECTURES. |
Verification of learning | |
---|---|
ORAL EXAM. |
Texts | |
---|---|
INTRODUCTION TO MODERN CRYPTOGRAPHY BY KATZ AND LINDELL. |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]