INFORMATION SECURITY
(objectives)
For introduction to cryptography: give an introduction to cryptography useful for understanding present-day innovations; explain the mathematical notions instrumental in the design of cryptographic algorithms and interest the students in the applications. The course aims to provide the tools for analyzing the security in telecommunication systems. The theoretical foundations, real implementation, systems for measuring the effectiveness of existing networks, security models are introduced during the course.
The problem of security in networked systems is introduced in, with reference to the cryptographic algorithms, protocols and standards. The course aims to provide a capacity for rational and systematic framework for ict security issues and tools available, including a preliminary capacity assessment of costs / benefits. Cloud systems security is also analyzed. The course will also touch on the the mathematical concepts needed in undertanding and possibly contructing cryptosystems and protocols, particularly in the realm of public-key cryptography.
|
Code
|
20801702 |
Language
|
ITA |
Type of certificate
|
Profit certificate
|
Module:
(objectives)
The aim of the course is the understanding of the basics and possible application scenarios of modern cryptography. By exploiting theoretical as well as practical tools, the student will be able to deal with the modern techniques for protecting data and communication confidentiality. Topics include encryption, pseudo-random generation, digital signatures, and hash functions. At the end of the course, the students will be able to select and apply the most appropriate crypto-system or cryptographic protocol for protecting data during transmission and/or storage.
|
Code
|
20801702-1 |
Language
|
ITA |
Type of certificate
|
Profit certificate
|
Credits
|
6
|
Scientific Disciplinary Sector Code
|
MAT/03
|
Contact Hours
|
42
|
Type of Activity
|
Related or supplementary learning activities
|
Teacher
|
BATTISTI FEDERICA
(syllabus)
The program outline is: - Introduction to cryptography - Crypto-system definition - Classical Ciphers: additive, substitution, and shift cipher - Symmetric encryption: DES, 3DES, and AES - Asymmetric encryption: RSA, Diffie-Hellman - Hash functions and Message Digest - Digital signature, certification authority, X.509/PKI (Public Key Infrastructure)
(reference books)
- Handbook of Applied Cryptography, A. J. Menezes, P. C. van Oorschot e S. A. Vanstone - Practical Cryptography, N. Ferguson and B. Schneier - Cryptography and Network Security Principles and Practices, William Stallings - Material provided during the lectures
|
Dates of beginning and end of teaching activities
|
From 02/03/2020 to 12/06/2020 |
Delivery mode
|
Traditional
|
Attendance
|
not mandatory
|
Evaluation methods
|
Written test
Oral exam
|
|
|
Module:
(objectives)
The problem of security in networked systems is introduced in, with reference to the cryptographic algorithms, protocols and standards. The course aims to provide a capacity for rational and systematic framework for ict security issues and tools available, including a preliminary capacity assessment of costs / benefits. Cloud systems security is also analyzed. The course will also touch on the the mathematical concepts needed in undertanding and possibly contructing cryptosystems and protocols, particularly in the realm of public-key cryptography.
|
Code
|
20801702-2 |
Language
|
ITA |
Type of certificate
|
Profit certificate
|
Credits
|
6
|
Scientific Disciplinary Sector Code
|
ING-INF/03
|
Contact Hours
|
42
|
Type of Activity
|
Core compulsory activities
|
Teacher
|
CARLI MARCO
(syllabus)
Kerberos e Diameter Sicurezza IP Web security Authentication Intrusion detection Honey pot Android security Cloud security Big data security Forensics Digital watermarking
(reference books)
Stallings’ Cryptography and Network Security, Seventh Edition
|
Dates of beginning and end of teaching activities
|
From 02/03/2020 to 12/06/2020 |
Delivery mode
|
Traditional
|
Attendance
|
not mandatory
|
Evaluation methods
|
Oral exam
|
|
|
|