NETWORK SECURITY

Computer science NETWORK SECURITY

0512100024
DIPARTIMENTO DI INFORMATICA
COMPUTER SCIENCE
2013/2014



YEAR OF DIDACTIC SYSTEM 2008
SECONDO SEMESTRE
CFUHOURSACTIVITY
648LESSONS
Objectives
KNOWLEDGE AND UNDERSTANDING:
THE CLASS INTRODUCES TO STUDENTS CRYPTOGRAPHIC AND SECURITY TECHNIQUES WHICH ARE USED TO SOLVE CONFIDENTIALITY, PRIVACY AND SERVICE AVAILABILITY ISSUES IN NETWORKS AND APPLICATIVE SETTINGS.

APPLYING KNOWLEDGE AND UNDERSTANDING:
THE CLASS AIMS AT ENABLING THE STUDENT TO USE, IN NETWORKS AND THE APPLICATIVE DOMAINS ON WHICH THE ATTENTION IS FOCUSED, THE PRESENTED TECHNIQUES. AT THE SAME TIME, THE CLASS AIMS AT ENABLING THE STUDENT TO APPLY THE CRYPTOGRAPHIC AND SECURITY TECHNIQUES IN SIMILAR APPLICATIVE DOMAINS WHICH SHARE COMMON FEATURES WITH THE PRESENTED AND STUDIED ONES.

MAKING JUDGEMENTS:
STUDENTS ARE DRIVEN THROUGH A CRITICAL AND RESPONSIBLE APPROACH TO STUDY PROBLEMS, TOOLS AND TECHNIQUES PRESENTED IN CLASS, IN ORDER TO STRENGTHEN THEIR PREPARATION AND TO BUILD THEIR OWN OPINIONS ON A SOLID BACKGROUND. THE REFERENCES PROVIDED BY THE TEACHER WILL BE HELPFUL IN THAT RESPECT. MOREOVER, SOME LECTURES ARE CLOSED BY "CHALLENGES", IN ORDER TO PUSH THE STUDENTS TO GET AN IN-DEPTH UNDERSTANDING OF SPECIFIC TOPICS AND MAKE THEIR OWN OPINIONS ON THE WEAKNESSES AND THE SUITABILITY OF THE PRESENTED TECHNIQUES.

COMMUNICATION SKILLS:
THROUGH THE WORKING-GROUP ACTIVITIES, THE CLASS AIMS AT ENCOURAGING STUDENT COLLABORATION AND THE DEVELOPMENT OF TEAM-RELATION SKILLS. DURING EACH ACTIVITY, STUDENTS ARE INVITED TO SHARE THEIR SKILLS IN ORDER TO FORMULATE COMMON SOLVING STRATEGIES AND TO PRESENT TO THE REST OF THE CLASS THE MOST SUITABLE ONES IN TERMS OF ADVANTAGES AND WEAKNESSES AND COMPUTATIONAL EFFICIENCY.

LEARNING ABILITIES
ALL ACTIVITIES IN CLASS AND AT HOME CONTRIBUTE TO STIMULATE AND STRENGTHEN THE STUDENT LEARNING ABILITIES.
Prerequisites
FAMILIARITY WITH COMPUTER NETWORKS AND TCP/IP PROTOCOLS
Contents
FIRST PART: CRYPTOGRAPHY

SYMMETRIC CRYPTOGRAPHY
CLASSIC CRYPTOGRAPHY;
BLOCK CIPHERS (FEISTEL CIPHER, DATA ENCRYPTION STANDARD, BLOWFISH, RC5, RC6, ADVANCED ENCRYPTION STANDARD, MODALITÀ OPERATIVE);
STREAM CIPHER (LFSR, RC4); KEY DISTRIBUTION; PSEUDORANDOM GENERATORS.

PUBIC KEY CRYPTOGRAPHY
ALGORITHMS IN NUMBER THEORY; RSA;
KEY DISTRIBUTION (DIFFIE-HELLMAN, MERKLE PUZZLES).

DIGITAL SIGNATURES
RSA, DIGITAL SIGNATURE STANDARD.

HASH FUNCTIONS AND DATA INTEGRITY
HASH FUNCTIONS (BIRTHDAY ATTACK, MD4, MD5, SHA-1);

DIGITAL TIMESTAMPING;
MESSAGE AUTHENTICATION CODE (CBC-MAC, HMAC) .

SECOND PART: NETWORK SECURITY

PUBLIC KEY INFRASTRUCTURE
CERTIFICATES, X.509 CERTIFICATES, CERTIFICATION AUTHORITY, CERTIFICATES MANAGMENT.

EMAIL SECURITY
PRETTY GOOD PRIVACY.

WEB SECURITY
SSL, TLS, OPENSSL.

USER AUTHENTICATION
PASSWORD AND PIN, ONE-TIME PASSWORD, BIOMETRIC TECHNIQUES.

MALICIOUS CODE AND FIREWALL.
Teaching Methods
THE NETWORK SECURITY CLASS CONSISTS MAINLY IN LECTURES. THESE ARE INTEGRATED WITH PROJECTS DONE BY WORKING GROUPS AND HOMEWORKS, SUCH AS ANALISYS OF ISSUES PRESENTED IN CLASS, OR SMALL IMPLEMENTATIONS. THE RESULTS ARE PRESENTED AND ANALIZED IN CLASS.
Verification of learning
EVALUATION AND GRADE:

STUDENTS ARE EVALUATED THROUGH A WRITTEN PART AND AN ORAL PART. SIX CALLS ARE PROVIDED EVERY YEAR.

PROJECTS DONE BY SINGLE OR GROUP OF STUDENTS CAN SUBSTITUTE OR INTEGRATE THE WRITTEN OR THE ORAL PART.
Texts
DOUGLAS STINSON, CRYPTOGRAPHY: THEORY AND PRACTICE, THIRD EDITION, NOVEMBER 2005, CRC PRESS.

WILLIAM STALLING, CRITTOGRAFIA E SICUREZZA DELLE RETI, SECONDA EDIZIONE, 2007, MCGRAW-HILL.
More Information
THE CLASS IS TAUGHT IN ITALIAN. HOWEVER, IF REQUESTED, THE COURSE CAN BE TAUGHT IN ENGLISH.
  BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]