Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S DEGREE IN INFORMATION AND COMMUNICATION TECHNOLOGIES (Syllabus 2009). (Teaching unit Optional) MASTER'S DEGREE IN ELECTRONIC ENGINEERING (Syllabus 2009). (Teaching unit Optional) DEGREE IN TELECOMMUNICATIONS ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S DEGREE IN NETWORK ENGINEERING (Syllabus 2009). (Teaching unit Optional) 5 230 - ETSETB - Barcelona School of Telecommunications Engineering Prior skills Knowledge of communication networks (functioning, related protocols, etc.). Elemental knowledge of Number Theory. Requirements Teaching methodology Learning objectives of the subject To study the main security threats to communication networks (X-25, Internet, mobile communications, broad-band, local networks, etc.). To establish certain security mechanisms that avoid or considerably diminish these threats. To introduce students to modern cryptography techniques. To study specific cryptography techniques that guarantee security in certain applications (e-mail, e-commerce, web access, etc.). To introduce the most widely known standards for each case. 1 / 6
Content 1. Communication networks. Security services and related mechanisms (2 hours) 2. Basic concepts of modern cryptography. Fundamental differences with classical cryptography (4 hours) 3. Most frequent encryption algorithms (18 hours) 3.1. Conceptos de la Teoría de Números aplicados a la criptografía 3.2. Symmetric conventional cryptosystems (DES, IDEA, AES) 3.3. Flow encrypt systems 3.4. Diffie-Helmann protocol 3.5. Public key cryptosystems (RSA, EL-Gamal, Rabin, etc.) 3.6. Cryptosystems with elliptical curves 2 / 6
3.7. Quantum cryptography 4. Key exchange service (2 hours) 4.1. Conventional/symmetrical cryptography 4.1.1. Conventional/symmetrical cryptography 4.1.2. Asymmetrical/public cryptography 5. Authentication and digital signature service (8 hours) 5.1. Authenticators creation procedures (Conventional cryptography, MAC, hash functions) 5.2. Standard hash functions: MD5, SHA-1 5.3. El Gamal, Fiat-Shamir, DSS signature 3 / 6
5.4. Authentication applications: X-509, Kerberos, TACACS+, RADIUS 5.5. P.K.I. ( Public key Infrastructure) 6. Security on the Internet. IPSEC architecture (8 hours) 6.1. Key management on the Internet: OAKLEY, ISAKMAP 6.2. Internet authentication. HMAC function 6.3. Private networks access security ( L2F, PPTP, L2TP) 7. Mobile networks security (6 hours) 7.1. Local wireless network security ( protocol 802.11) 7.2. Security in GSM and DEC 4 / 6
8. E-mail security (4 hours) 8.1. PGP analysis 8.2. S/MIME analysis 8.3. Comparative analysis 9. Security in E-commerce (4 hours) 9.1. Web security. General aspects 9.2. SSL and TSL 9.3. Secure Electronic Transactions (SET,etc.) 10. Access control (4 hours) 5 / 6
10.1. Passwords use 10.2. Smart cards 10.3. Network protection. Firewalls usage Qualification system - Continuous assessment 40% - Final examination 60% Regulations for carrying out activities Bibliography Basic: Stallings, W. Cryptography and network security: principles and practice. 6th ed. Boston: Prentice Hall, 2014. ISBN 9780273793359. Complementary: Stajano, F. Security for ubiquitous computing. Chichester: John Wiley and Sons, 2002. ISBN 0470844930. Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of applied cryptography. Boca Ratón [etc.]: CRC Press, 1997. ISBN 0849385237. Others resources: 6 / 6