Computer science | NETWORK SECURITY
Computer science NETWORK SECURITY
cod. 0512100024
NETWORK SECURITY
0512100024 | |
DIPARTIMENTO DI INFORMATICA | |
COMPUTER SCIENCE | |
2013/2014 |
YEAR OF DIDACTIC SYSTEM 2008 | |
SECONDO SEMESTRE |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 6 | 48 | LESSONS |
Objectives | |
---|---|
KNOWLEDGE AND UNDERSTANDING: THE CLASS INTRODUCES TO STUDENTS CRYPTOGRAPHIC AND SECURITY TECHNIQUES WHICH ARE USED TO SOLVE CONFIDENTIALITY, PRIVACY AND SERVICE AVAILABILITY ISSUES IN NETWORKS AND APPLICATIVE SETTINGS. APPLYING KNOWLEDGE AND UNDERSTANDING: THE CLASS AIMS AT ENABLING THE STUDENT TO USE, IN NETWORKS AND THE APPLICATIVE DOMAINS ON WHICH THE ATTENTION IS FOCUSED, THE PRESENTED TECHNIQUES. AT THE SAME TIME, THE CLASS AIMS AT ENABLING THE STUDENT TO APPLY THE CRYPTOGRAPHIC AND SECURITY TECHNIQUES IN SIMILAR APPLICATIVE DOMAINS WHICH SHARE COMMON FEATURES WITH THE PRESENTED AND STUDIED ONES. MAKING JUDGEMENTS: STUDENTS ARE DRIVEN THROUGH A CRITICAL AND RESPONSIBLE APPROACH TO STUDY PROBLEMS, TOOLS AND TECHNIQUES PRESENTED IN CLASS, IN ORDER TO STRENGTHEN THEIR PREPARATION AND TO BUILD THEIR OWN OPINIONS ON A SOLID BACKGROUND. THE REFERENCES PROVIDED BY THE TEACHER WILL BE HELPFUL IN THAT RESPECT. MOREOVER, SOME LECTURES ARE CLOSED BY "CHALLENGES", IN ORDER TO PUSH THE STUDENTS TO GET AN IN-DEPTH UNDERSTANDING OF SPECIFIC TOPICS AND MAKE THEIR OWN OPINIONS ON THE WEAKNESSES AND THE SUITABILITY OF THE PRESENTED TECHNIQUES. COMMUNICATION SKILLS: THROUGH THE WORKING-GROUP ACTIVITIES, THE CLASS AIMS AT ENCOURAGING STUDENT COLLABORATION AND THE DEVELOPMENT OF TEAM-RELATION SKILLS. DURING EACH ACTIVITY, STUDENTS ARE INVITED TO SHARE THEIR SKILLS IN ORDER TO FORMULATE COMMON SOLVING STRATEGIES AND TO PRESENT TO THE REST OF THE CLASS THE MOST SUITABLE ONES IN TERMS OF ADVANTAGES AND WEAKNESSES AND COMPUTATIONAL EFFICIENCY. LEARNING ABILITIES ALL ACTIVITIES IN CLASS AND AT HOME CONTRIBUTE TO STIMULATE AND STRENGTHEN THE STUDENT LEARNING ABILITIES. |
Prerequisites | |
---|---|
FAMILIARITY WITH COMPUTER NETWORKS AND TCP/IP PROTOCOLS |
Contents | |
---|---|
FIRST PART: CRYPTOGRAPHY SYMMETRIC CRYPTOGRAPHY CLASSIC CRYPTOGRAPHY; BLOCK CIPHERS (FEISTEL CIPHER, DATA ENCRYPTION STANDARD, BLOWFISH, RC5, RC6, ADVANCED ENCRYPTION STANDARD, MODALITÀ OPERATIVE); STREAM CIPHER (LFSR, RC4); KEY DISTRIBUTION; PSEUDORANDOM GENERATORS. PUBIC KEY CRYPTOGRAPHY ALGORITHMS IN NUMBER THEORY; RSA; KEY DISTRIBUTION (DIFFIE-HELLMAN, MERKLE PUZZLES). DIGITAL SIGNATURES RSA, DIGITAL SIGNATURE STANDARD. HASH FUNCTIONS AND DATA INTEGRITY HASH FUNCTIONS (BIRTHDAY ATTACK, MD4, MD5, SHA-1); DIGITAL TIMESTAMPING; MESSAGE AUTHENTICATION CODE (CBC-MAC, HMAC) . SECOND PART: NETWORK SECURITY PUBLIC KEY INFRASTRUCTURE CERTIFICATES, X.509 CERTIFICATES, CERTIFICATION AUTHORITY, CERTIFICATES MANAGMENT. EMAIL SECURITY PRETTY GOOD PRIVACY. WEB SECURITY SSL, TLS, OPENSSL. USER AUTHENTICATION PASSWORD AND PIN, ONE-TIME PASSWORD, BIOMETRIC TECHNIQUES. MALICIOUS CODE AND FIREWALL. |
Teaching Methods | |
---|---|
THE NETWORK SECURITY CLASS CONSISTS MAINLY IN LECTURES. THESE ARE INTEGRATED WITH PROJECTS DONE BY WORKING GROUPS AND HOMEWORKS, SUCH AS ANALISYS OF ISSUES PRESENTED IN CLASS, OR SMALL IMPLEMENTATIONS. THE RESULTS ARE PRESENTED AND ANALIZED IN CLASS. |
Verification of learning | |
---|---|
EVALUATION AND GRADE: STUDENTS ARE EVALUATED THROUGH A WRITTEN PART AND AN ORAL PART. SIX CALLS ARE PROVIDED EVERY YEAR. PROJECTS DONE BY SINGLE OR GROUP OF STUDENTS CAN SUBSTITUTE OR INTEGRATE THE WRITTEN OR THE ORAL PART. |
Texts | |
---|---|
DOUGLAS STINSON, CRYPTOGRAPHY: THEORY AND PRACTICE, THIRD EDITION, NOVEMBER 2005, CRC PRESS. WILLIAM STALLING, CRITTOGRAFIA E SICUREZZA DELLE RETI, SECONDA EDIZIONE, 2007, MCGRAW-HILL. |
More Information | |
---|---|
THE CLASS IS TAUGHT IN ITALIAN. HOWEVER, IF REQUESTED, THE COURSE CAN BE TAUGHT IN ENGLISH. |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2016-09-30]