Carlo BLUNDO | WEB CRYPTOGRAPHIC PROTOCOLS
Carlo BLUNDO WEB CRYPTOGRAPHIC PROTOCOLS
cod. 0522500040
WEB CRYPTOGRAPHIC PROTOCOLS
0522500040 | |
DIPARTIMENTO DI INFORMATICA | |
COMPUTER SCIENCE | |
2014/2015 |
YEAR OF COURSE 2 | |
YEAR OF DIDACTIC SYSTEM 2010 | |
PRIMO SEMESTRE |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 6 | 48 | LESSONS |
Objectives | |
---|---|
KNOWLEDGE AND UNDERSTANDING THE STUDENT WILL ACQUIRE KNOWLEDGE AND METHODOLOGIES TO ADDRESS ISSUES RELATED TO THE USE OF CRYPTOGRAPHIC PRIMITIVES AND CRYPTOGRAPHIC PROTOCOLS IN DISTRIBUTED ENVIRONMENTS. THE STUDENT WILL BE ABLE TO DEVISE WHICH CRYPTOGRAPHIC PRIMITIVE ARE NEEDED TO IMPLEMENT CRYPTOGRAPHIC PROTOCOLS AND WHAT ARE THE SECURITY PROPERTIES THAT MUST SATISFY IN ORDER TO ENSURE GIVEN REQUIREMENTS. APPLYING KNOWLEDGE AND UNDERSTANDING THE STUDENT WILL BE ABLE TO DESIGN SIMPLE CRYPTOGRAPHIC PROTOCOLS AND TO PROVE THEIR SECURITY WITHIN THE DEVISED SECURITY MODEL. THE STUDENT WILL BE ABLE TO ANSWER THE FOLLOWING QUESTIONS: WHY DO WE THINK THAT THE SCHEMES ARE SECURE? CAN WE PROVE THAT SOME SCHEMES ARE SECURE? ADDITIONALLY, THE STUDENT INTERESTED IN RESEARCH WILL LEARN WHAT THE MAIN RESEARCH CHALLENGES ARE IN THE AREA, AND WILL IMPROVE HIS/HER BACKGROUND FOR FUTURE STUDIES. MAKING JUDGEMENTS THE STUDENT WILL ACQUIRE A METHODOLOGY FOR THE ANALYSIS OF MECHANISMS ENSURING THAT A PROTOCOL IS SECURE. THE STUDENT WILL BE ABLE TO JUDGE WHAT, AMONG SEVERAL CRYPTOGRAPHIC PROTOCOLS, IS BEST SUITED TO SOLVE A GIVEN PROBLEM. COMMUNICATION SKILLS THE STUDENT WILL BE ABLE TO COMMUNICATE WITH COMPETENCE AND PROPER TERMS, WITH A SPECIALIZED AND NON-SPECIALIZED AUDIENCE, ISSUES REGARDING THE USE OF CRYPTOGRAPHIC PROTOCOLS. THE STUDENT WILL DEVELOP THE ABILITY TO COMMUNCATE WHAT HE/SHE LEARNED IN A CLEAR AND CONCISE WAY. LEARNING SKILLS THE STUDENT WILL BE ABLE TO AUTONOMOUSLY DEAL WITH ANY ISSUE RELATED TO THE USE OF CRYPTOGRAPHIC PROTOCOLS IN DISTRIBUTED ENVIRONMENTS. THE STUDENT WILL BE ABLE TO UNDESTAND CRYPTOGRAPHIC PROTOCOLS (FORMAL DESCRIPTION AND SECURITY MODEL) DESCRIBED IN SCIENTIFIC PAPERS. THE COURSE WILL PROVIDE THE STUDENT WITH THE PROPER TOOLS TO ALLOW CONTINUOUS UPDATING OF HIS/HER KNOWLEDGE EVEN AFTER THE CONCLUSION OF THE COURSE ITSELF (LIFE LONG LEARNING). |
Prerequisites | |
---|---|
FAMILIARITY WITH BASIC KNOWLEDGE OF PROBABILITY THEORY, ALGORITHMS, AND COMPLEXITY THEORY. SOME FAMILIARITY WITH CRYPTOGRAPHIC PRIMITIVES IS PREFERRED. HOWEVER, THE REQUIRED SUBJECTS CAN BE CAUGHT UP DURING THE COURSE. |
Contents | |
---|---|
THIS COURSE WILL PRESENT BOTH THE MOST ADVANCED CRYPTOGRAPHIC PRIMITIVES AND SOME OF THE RECENT RESEARCH TOPICS ON CRYPTOGRAPHIC PROTOCOLS. BY ATTENDING THIS COURSE, THE STUDENT WILL ACQUIRE THE BASIC NOTION ABOUT CRYPTOGRAPHIC PRIMITIVES AND THEIR UNDERLYING PRINCIPLE IN A FORMAL AND RIGOROUS WAY. SECURITY MODELS (2H) SECRET SHARING (2H) VISUAL CRYPTOGRAPHY (2H) PROBABILISTIC ENCRYPTION (2H) COMMITMENT (4H) ZERO KNOWLEDGE (4H) OBLIVIOUS TRANSFER (4H) SECURE MULTI-PARTY COMPUTATION (6H) PRIVATE SET INTERSECTION (4H) PRIVATE INFORMATION RETRIEVAL (4H) SEARCHABLE ENCRYPTION (4H) CERTIFIED ELECTRONIC MAIL (4H) ELECTRONIC VOTING (4H) ANONYMITY AND MIX NETWORKS (2H) SECURE AND CERTIFIED LOG (2H) |
Teaching Methods | |
---|---|
THE COURSE SPANS 48 HOURS OF LECTURES DEDICATED TO PRESENT SOME CRYPTOGRAPHIC PROTOCOLS AND 24 HOURS IN LAB DEVOTED TO ILLUSTRATE THE JAVA IMPLEMENTATION OF SOME CRYPTOGRAPHIC PRIMITIVES AND SOME PRIVATE PROTOCOLS. THE COURSE MATERIAL IS ILLUSTRATED USING SLIDES. ATTENDANCE IS NOT MANDATORY, BUT HIGHLY RECOMMENDED. A SATISFACTORY PREPARATION REQUIRES AN AVERAGE OF TWO HOURS OF STUDY FOR EACH HOUR SPENT IN THE CLASSROOM. |
Verification of learning | |
---|---|
TWO SEMINARS, A SHORT ONE ON A TOPIC CHOSEN BY THE STUDENT (MID-TERM) AND ONE ON A TOPIC CHOSEN BY THE INSTRUCTOR (FINAL). ORAL EXAMINATION, IF NEEDED. |
Texts | |
---|---|
SELECTED SCIENTIFIC PAPERS, THEY WILL ALSO BE AVAILABLE ON-LINE ON THE COURSE'S WEB SITE. HANDOUTS: SLIDES COVERING TOPICS PRESENTED DURING LECTURES. |
More Information | |
---|---|
SEE COURSE'S WEB SITE: HTTP://CAPRERA.DIA.UNISA.IT/PC/ |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]