WEB CRYPTOGRAPHIC PROTOCOLS

Carlo BLUNDO WEB CRYPTOGRAPHIC PROTOCOLS

0522500040
DIPARTIMENTO DI INFORMATICA
COMPUTER SCIENCE
2014/2015

YEAR OF COURSE 2
YEAR OF DIDACTIC SYSTEM 2010
PRIMO SEMESTRE
CFUHOURSACTIVITY
648LESSONS
Objectives
KNOWLEDGE AND UNDERSTANDING

THE STUDENT WILL ACQUIRE KNOWLEDGE AND METHODOLOGIES TO ADDRESS ISSUES RELATED TO THE USE OF CRYPTOGRAPHIC PRIMITIVES AND CRYPTOGRAPHIC PROTOCOLS IN DISTRIBUTED ENVIRONMENTS. THE STUDENT WILL BE ABLE TO DEVISE WHICH CRYPTOGRAPHIC PRIMITIVE ARE NEEDED TO IMPLEMENT CRYPTOGRAPHIC PROTOCOLS AND WHAT ARE THE SECURITY PROPERTIES THAT MUST SATISFY IN ORDER TO ENSURE GIVEN REQUIREMENTS.


APPLYING KNOWLEDGE AND UNDERSTANDING

THE STUDENT WILL BE ABLE TO DESIGN SIMPLE CRYPTOGRAPHIC PROTOCOLS AND TO PROVE THEIR SECURITY WITHIN THE DEVISED SECURITY MODEL. THE STUDENT WILL BE ABLE TO ANSWER THE FOLLOWING QUESTIONS: WHY DO WE THINK THAT THE SCHEMES ARE SECURE? CAN WE PROVE THAT SOME SCHEMES ARE SECURE? ADDITIONALLY, THE STUDENT INTERESTED IN RESEARCH WILL LEARN WHAT THE MAIN RESEARCH CHALLENGES ARE IN THE AREA, AND WILL IMPROVE HIS/HER BACKGROUND FOR FUTURE STUDIES.


MAKING JUDGEMENTS

THE STUDENT WILL ACQUIRE A METHODOLOGY FOR THE ANALYSIS OF MECHANISMS ENSURING THAT A PROTOCOL IS SECURE. THE STUDENT WILL BE ABLE TO JUDGE WHAT, AMONG SEVERAL CRYPTOGRAPHIC PROTOCOLS, IS BEST SUITED TO SOLVE A GIVEN PROBLEM.


COMMUNICATION SKILLS

THE STUDENT WILL BE ABLE TO COMMUNICATE WITH COMPETENCE AND PROPER TERMS, WITH A SPECIALIZED AND NON-SPECIALIZED AUDIENCE, ISSUES REGARDING THE USE OF CRYPTOGRAPHIC PROTOCOLS. THE STUDENT WILL DEVELOP THE ABILITY TO COMMUNCATE WHAT HE/SHE LEARNED IN A CLEAR AND CONCISE WAY.


LEARNING SKILLS

THE STUDENT WILL BE ABLE TO AUTONOMOUSLY DEAL WITH ANY ISSUE RELATED TO THE USE OF CRYPTOGRAPHIC PROTOCOLS IN DISTRIBUTED ENVIRONMENTS. THE STUDENT WILL BE ABLE TO UNDESTAND CRYPTOGRAPHIC PROTOCOLS (FORMAL DESCRIPTION AND SECURITY MODEL) DESCRIBED IN
SCIENTIFIC PAPERS. THE COURSE WILL PROVIDE THE STUDENT WITH THE PROPER TOOLS TO ALLOW CONTINUOUS UPDATING OF HIS/HER KNOWLEDGE EVEN AFTER THE CONCLUSION OF THE COURSE ITSELF (LIFE LONG LEARNING).
Prerequisites
FAMILIARITY WITH BASIC KNOWLEDGE OF PROBABILITY THEORY, ALGORITHMS, AND COMPLEXITY THEORY. SOME FAMILIARITY WITH CRYPTOGRAPHIC PRIMITIVES IS PREFERRED. HOWEVER, THE REQUIRED SUBJECTS CAN BE CAUGHT UP DURING THE COURSE.
Contents
THIS COURSE WILL PRESENT BOTH THE MOST ADVANCED CRYPTOGRAPHIC PRIMITIVES AND SOME OF THE RECENT RESEARCH TOPICS ON CRYPTOGRAPHIC PROTOCOLS. BY ATTENDING THIS COURSE, THE STUDENT WILL ACQUIRE THE BASIC NOTION ABOUT CRYPTOGRAPHIC PRIMITIVES AND THEIR UNDERLYING PRINCIPLE IN A FORMAL AND RIGOROUS WAY.


SECURITY MODELS (2H)

SECRET SHARING (2H)

VISUAL CRYPTOGRAPHY (2H)

PROBABILISTIC ENCRYPTION (2H)

COMMITMENT (4H)

ZERO KNOWLEDGE (4H)

OBLIVIOUS TRANSFER (4H)

SECURE MULTI-PARTY COMPUTATION (6H)

PRIVATE SET INTERSECTION (4H)

PRIVATE INFORMATION RETRIEVAL (4H)

SEARCHABLE ENCRYPTION (4H)

CERTIFIED ELECTRONIC MAIL (4H)

ELECTRONIC VOTING (4H)

ANONYMITY AND MIX NETWORKS (2H)

SECURE AND CERTIFIED LOG (2H)
Teaching Methods
THE COURSE SPANS 48 HOURS OF LECTURES DEDICATED TO PRESENT SOME CRYPTOGRAPHIC PROTOCOLS AND 24 HOURS IN LAB DEVOTED TO ILLUSTRATE THE JAVA IMPLEMENTATION OF SOME CRYPTOGRAPHIC PRIMITIVES AND SOME PRIVATE PROTOCOLS. THE COURSE MATERIAL IS ILLUSTRATED USING SLIDES. ATTENDANCE IS NOT MANDATORY, BUT HIGHLY RECOMMENDED. A SATISFACTORY PREPARATION REQUIRES AN AVERAGE OF TWO HOURS OF STUDY FOR EACH HOUR SPENT IN THE CLASSROOM.
Verification of learning
TWO SEMINARS, A SHORT ONE ON A TOPIC CHOSEN BY THE STUDENT (MID-TERM) AND ONE ON A TOPIC CHOSEN BY THE INSTRUCTOR (FINAL). ORAL EXAMINATION, IF NEEDED.
Texts
SELECTED SCIENTIFIC PAPERS, THEY WILL ALSO BE AVAILABLE ON-LINE ON THE COURSE'S WEB SITE. HANDOUTS: SLIDES COVERING TOPICS PRESENTED DURING LECTURES.
More Information
SEE COURSE'S WEB SITE: HTTP://CAPRERA.DIA.UNISA.IT/PC/
  BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]