Clemente GALDI | SECURE PROTOCOLS AND PRIMITIVES FOR COMPUTATION AND COMMUNICATION
Clemente GALDI SECURE PROTOCOLS AND PRIMITIVES FOR COMPUTATION AND COMMUNICATION
0222600005 | |
DIPARTIMENTO DI SCIENZE AZIENDALI - MANAGEMENT & INNOVATION SYSTEMS | |
EQF7 | |
BUSINESS INNOVATION AND INFORMATICS - BUSINESS, INNOVAZIONE ED INFORMATICA | |
2018/2019 |
OBBLIGATORIO | |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
SECONDO SEMESTRE |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 10 | 60 | LESSONS |
Objectives | |
---|---|
THE AIM OF THE COURSE IS TO PRESENT BASIC CRYPTOGRAPHIC PRIMITIVES (ENCRYPTION, AUTHENTICATION, DIGITAL SIGNATURE, PSEUDO'RANDOM GENERATION) ALONG WITH CURRENT RESEARCH TOPICS AND INDUSTRIAL STANDARDS. AT THE END OF THE CLASS THE STUDENT WILL ACQUIRE KNOWLEDGE AND METHODOLOGY NEEDED TO APPROACH ISSUES RELATIVE TO THE USE OF THE CRYPTOGRAPHIC PRIMITIVES. |
Prerequisites | |
---|---|
BASIC KNOWLEDGE OF PROGRAMMING. NO KNOWLEDGE OF SECURITY AND CRYPTOGRAPHY IS ASSUMED. |
Contents | |
---|---|
INTRODUCTION TO CRYPTOGRAPHY AND DATA SECURITY CLASSICAL CIPHERS SECURITY MODELS THE DATA ENCRYPTION STANDARD (DES) AND ALTERNATIVES THE ADVANCED ENCRYPTION STANDARD (AES) BLOCK CIPHERS: MODES OF OPERATION INTRODUCTION TO PUBLIC-KEY CRYPTOGRAPHY THE RSA CRYPTOSYSTEM - ATTACKS PUBLIC-KEY CRYPTO-SYSTEMS BASED ON THE DISCRETE LOGARITHM PROBLEM ELLIPTIC CURVE CRYPTOSYSTEMS PROBABILISTIC ENCRYPTION DIGITAL SIGNATURES THE DIGITAL SIGNATURE ALGORITHM (DSA) HASH FUNCTIONS MESSAGE AUTHENTICATION CODES (MACS) KEY ESTABLISHMENT PUBLIC-KEY INFRASTRUCTURES (PKI) AND CAS |
Teaching Methods | |
---|---|
LECTURES, GUIDED EXERCISES AND LABS. DURING THE LECTURES CRYPTOGRAPHIC PRIMITIVES ARE PRESENTED AND THEIR APPLICATIONS TO REAL-LIFE PROBLEMS ARE DISCUSSED. IN THE LABS STUDENTS ARE REQUIRED TO USE (OR IMPLEMENT) CRYPTOGRAPHIC PRIMITIVES PRESENTED IN THE LECTURES. |
Verification of learning | |
---|---|
THE FINAL EXAM IS DESIGNED TO EVALUATE AS A WHOLE THE KNOWLEDGE AND UNDERSTANDING OF THE CONCEPTS PRESENTED IN THE COURSE, AND THE ABILITY TO APPLY SUCH KNOWLEDGE IN SOLVING AND SECURITY PROBLEMS. THE EXAM CONSISTS OF THE DISCUSSION OF THE HOMEWORKS REALIZED DURING THE COURSE, WHOSE AIM IS TO ASSESS THE ABILITY OF APPLYING KNOWLEDGE OF THE CRYPTOGRAPHIC PRIMITIVES PRESENTED IN CLASS AND/OR REALIZE EFFICIENT IMPLEMENTATIONS, FOLLOWED BY A TEST (WRITTEN OR ORAL) WHOSE AIM IS TO ASSESS THE ACQUIRED KNOWLEDGE OF CRYPTOGRAPHIC PRIMITIVES AND ABILITY TO UNDERSTANDING AND THE PRESENTATION SKILLS. |
Texts | |
---|---|
CHRISTOF PAAR AND JAN PELZL UNDERSTANDING CRYPTOGRAPHY A TEXTBOOK FOR STUDENTS AND PRACTITIONERS SPRINGER, 2010 WILLIAM STALLINGS CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE (6TH EDITION) PEARSON |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2019-10-21]