11557 - CRIPT - Cryptography and Network Security



Similar documents
Wireless Mobile Internet Security. 2nd Edition

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CRYPTOG NETWORK SECURITY

An Introduction to Cryptography as Applied to the Smart Grid

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Cryptography and network security CNET4523

Chapter 6 Electronic Mail Security

Cryptography and Key Management Basics

CRYPTOGRAPHY AND NETWORK SECURITY

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

NS - Network Security

BUY ONLINE FROM:

Chapter 8. Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Chapter 7 Transport-Level Security

F21CN: Computer Network Security: Overview

NETWORK ADMINISTRATION AND SECURITY

Table of Contents. Bibliografische Informationen digitalisiert durch

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Introduction to Cyber Security / Information Security

SE 4472a / ECE 9064a: Information Security

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Cryptography and Network Security Chapter 15

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Strong Authentication for Future Web Applications

Security WILEY. Wireless Mobile Internet. Second Edition. Man Young Rhee. Endowed Chair Professor, Kyung Hee University

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ICTTEN8195B Evaluate and apply network security

Security + Certification (ITSY 1076) Syllabus

VALLIAMMAI ENGINEERING COLLEGE

Network Security Fundamentals

Savitribai Phule Pune University

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security Essentials Chapter 7

Weighted Total Mark. Weighted Exam Mark

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

form approved June/2006 revised Page 1 of 7

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Lesson Plans Security+

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Release: 1. ICANWK502A Implement secure encryption technologies

Public Key Cryptography of Digital Signatures

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Tim Bovles WILEY. Wiley Publishing, Inc.

Curran, K. Tutorials. Independent study (including assessment) N/A

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Information Security and Cryptography

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Internetwork Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Chapter 10. Network Security

Communication Security for Applications

Overview. Protocols. VPN and Firewalls

Computer and Network Security. Alberto Marchetti Spaccamela

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

How To Encrypt Data With Encryption

, ) I Transport Layer Security

PGP from: Cryptography and Network Security

EXAM questions for the course TTM Information Security May Part 1

Eleventh Hour Security+

Computer Security: Principles and Practice

Key & Data Storage on Mobile Devices

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

CS 5490/6490: Network Security Fall 2015

Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti

Lecture 9 - Network Security TDTS (ht1)

WebSphere DataPower Release FIPS and NIST SP a support.

Network Security. Outline of the Tutorial

Common Syllabus Revised

Network Security. Lecture 3

Network Security Essentials:

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

McAfee Firewall Enterprise 8.2.1

How To Understand And Understand The Security Of A Key Infrastructure

Freescale Security Backgrounder Page 1

Module 1: e- Learning

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Transcription:

Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S DEGREE IN INFORMATION AND COMMUNICATION TECHNOLOGIES (Syllabus 2009). (Teaching unit Optional) MASTER'S DEGREE IN ELECTRONIC ENGINEERING (Syllabus 2009). (Teaching unit Optional) DEGREE IN TELECOMMUNICATIONS ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S DEGREE IN NETWORK ENGINEERING (Syllabus 2009). (Teaching unit Optional) 5 230 - ETSETB - Barcelona School of Telecommunications Engineering Prior skills Knowledge of communication networks (functioning, related protocols, etc.). Elemental knowledge of Number Theory. Requirements Teaching methodology Learning objectives of the subject To study the main security threats to communication networks (X-25, Internet, mobile communications, broad-band, local networks, etc.). To establish certain security mechanisms that avoid or considerably diminish these threats. To introduce students to modern cryptography techniques. To study specific cryptography techniques that guarantee security in certain applications (e-mail, e-commerce, web access, etc.). To introduce the most widely known standards for each case. 1 / 6

Content 1. Communication networks. Security services and related mechanisms (2 hours) 2. Basic concepts of modern cryptography. Fundamental differences with classical cryptography (4 hours) 3. Most frequent encryption algorithms (18 hours) 3.1. Conceptos de la Teoría de Números aplicados a la criptografía 3.2. Symmetric conventional cryptosystems (DES, IDEA, AES) 3.3. Flow encrypt systems 3.4. Diffie-Helmann protocol 3.5. Public key cryptosystems (RSA, EL-Gamal, Rabin, etc.) 3.6. Cryptosystems with elliptical curves 2 / 6

3.7. Quantum cryptography 4. Key exchange service (2 hours) 4.1. Conventional/symmetrical cryptography 4.1.1. Conventional/symmetrical cryptography 4.1.2. Asymmetrical/public cryptography 5. Authentication and digital signature service (8 hours) 5.1. Authenticators creation procedures (Conventional cryptography, MAC, hash functions) 5.2. Standard hash functions: MD5, SHA-1 5.3. El Gamal, Fiat-Shamir, DSS signature 3 / 6

5.4. Authentication applications: X-509, Kerberos, TACACS+, RADIUS 5.5. P.K.I. ( Public key Infrastructure) 6. Security on the Internet. IPSEC architecture (8 hours) 6.1. Key management on the Internet: OAKLEY, ISAKMAP 6.2. Internet authentication. HMAC function 6.3. Private networks access security ( L2F, PPTP, L2TP) 7. Mobile networks security (6 hours) 7.1. Local wireless network security ( protocol 802.11) 7.2. Security in GSM and DEC 4 / 6

8. E-mail security (4 hours) 8.1. PGP analysis 8.2. S/MIME analysis 8.3. Comparative analysis 9. Security in E-commerce (4 hours) 9.1. Web security. General aspects 9.2. SSL and TSL 9.3. Secure Electronic Transactions (SET,etc.) 10. Access control (4 hours) 5 / 6

10.1. Passwords use 10.2. Smart cards 10.3. Network protection. Firewalls usage Qualification system - Continuous assessment 40% - Final examination 60% Regulations for carrying out activities Bibliography Basic: Stallings, W. Cryptography and network security: principles and practice. 6th ed. Boston: Prentice Hall, 2014. ISBN 9780273793359. Complementary: Stajano, F. Security for ubiquitous computing. Chichester: John Wiley and Sons, 2002. ISBN 0470844930. Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of applied cryptography. Boca Ratón [etc.]: CRC Press, 1997. ISBN 0849385237. Others resources: 6 / 6