72942 - Information Security M

Academic Year 2017/2018

  • Teaching Mode: Traditional lectures
  • Campus: Bologna
  • Corso: Second cycle degree programme (LM) in Computer Engineering (cod. 0937)

Learning outcomes

Knowledge and engineering skills related to the design, development and deployment of algorithms and protocols for securing systems and networks.

Course contents

1.  Security Technologies: Overview
2.  Principles of Cryptography: Basic building blocks: PRNG, Hash, identification protocols
3.  Classic Cryptography
4.  Symmentric ciphers and symmetric-cryptography-based authentication mechanisms. Examples of common use cases: RC4, DES, AES, HMAC, Password, challenge-response protocols.
5.  Theory Number  Principles. DH key exchange. Asymmetric ciphers, hybrid ciphers and asymmetric cryptography-based authetication schemas. Digital signatures. Common case studies: RSA, ElGamal, DSA.
6.  Security Infrastructures to support authentication and confidentiality. Public-key Infrastructures. PGP. Kerberos
7.  Secure protocols to protect network communication. TLS/SS. Ip securitiy -IPSEC, VPN.
8. Secure programming in Java environments

Readings/Bibliography

Slides on the course web site
References:

[1] Bruce Schneier: “Applied Cryptography ” John Wiley 1996

[2] A.J. Menezes, P.C. Van Oorschot, S.A. Vanstone: “Handbook of Applied Cryptography” CRC Press 1997

[3] Paolo Ferragina, Fabrizio Luccio: “Crittografia. Principi, Algoritmi, Applicazioni ” Bollati Boringhieri 2001

[4] William Stalling: “Sicurezza delle reti. Applicazioni e standard ” Addison Wesley Longman Italia 2001

[5] Bruce Schneier: “Sicurezza digitale. Miti da sfatare, strategie da adottare ”Tecniche nuove 2001

[6] Henk C.A. van Tilborg: “Fundamentals of Cryptology” Kluwer Academic Publishers 2001

[7] William Stalling: “Crittografia e sicurezza delle reti. Standard, Tecniche,Applicazioni ” McGraw-Hill Italia 2003

[8] N.Ferguson, B.Schneier “Practical Cryptography” Wiley Publishing 2003

[9] C.Pfleeger, S.Pfleeger:”Sicurezza in informatica” Pearson Education Italia, 2004


Teaching methods

Frontal lectures and laboratory activities

Assessment methods

Oral exam and development of a secure java-based application

Teaching tools

slides and laboratory activities

Links to further information

http://www.lia.deis.unibo.it/Courses/SicurezzaM1718

Office hours

See the website of Rebecca Montanari