logo-polimi
Loading...
Risorse bibliografiche
Risorsa bibliografica obbligatoria
Risorsa bibliografica facoltativa
Scheda Riassuntiva
Anno Accademico 2019/2020
Scuola Scuola di Ingegneria Industriale e dell'Informazione
Insegnamento 054329 - NETWORK SECURITY AND CRYPTOGRAPHY
Docente Verticale Giacomo
Cfu 5.00 Tipo insegnamento Monodisciplinare
Didattica innovativa L'insegnamento prevede  1.0  CFU erogati con Didattica Innovativa come segue:
  • Blended Learning & Flipped Classroom

Corso di Studi Codice Piano di Studio preventivamente approvato Da (compreso) A (escluso) Insegnamento
Ing Ind - Inf (Mag.)(ord. 270) - MI (474) TELECOMMUNICATION ENGINEERING - INGEGNERIA DELLE TELECOMUNICAZIONI*AZZZZ054329 - NETWORK SECURITY AND CRYPTOGRAPHY

Obiettivi dell'insegnamento

Present the different security models (information-theoretic and computational). Present the archetypal problems of cryptography (confidentiality, integrity, authentication, non repudiation) and teach the most common solutions in the symmetric and asymmetric key settings. Present some more advanced protocols.


Risultati di apprendimento attesi

Dublin Descriptors

Expected learning outcomes

Knowledge and Understanding

·       Understand the security guarantees of popular cryptographic schemes

·       Understand the security requirements of network applications.

·       Know how to combine simple cryptographic primitives preserving their security guarantees

·       Understand the difference between correctness and security

Applying knowledge and understanding

  • Execute simple algorithms that operate on elements of algebraic fields and rings of interest to cryptography
  • Evaluate the success probability of a given attack against a given configuration
  • Evaluate the performance of various algorithms in different attack scenarios and make design choices

Making judgements

  • Verify whether a given scheme satisfies the security requirements
  • Compare the suitability of different schemes and parameter settings
  • Identify the most common pitfalls in usage of cryptography

Lifelong learning skills

  • Students will learn how to read the specification of a cryptographic scheme
  • Students will learn how to evaluate the correctness of a cryptographic protocol and the soundness of security claims

Argomenti trattati
  1. Digital communications model with insecure channels. Archetypal problems (confidentiality, integrity, authentication)
  2. Information-theoretic security model. Classic ciphers.
  3. Computational security model. Pseudorandom generators. Stream ciphers.
  4. Secure hash functions. Construction and applications of secure hash functions.
  5. Block ciphers. Modes of operation.
  6. Message Integrity Control.
  7. Asymmetric cryptography. Digital signatures.
  8. Factoring problem. Asymmetric schemes based on the RSA assumtion.
  9. Discrete logarithm problem. Asymmetric schemes based on the Diffie-Hellman assumptions.
  10. Secret sharing schemes and privacy-preserving algorithms.
  11. Case studies.

 


Prerequisiti

None.


Modalità di valutazione

Written test (closed books).

During the classes there will be periodic learning assessments by means of short tests, assignements and homework assignments. Participation to these activities is optional. Scores obtained during these activities will be part of the final grade.

Type of Assessment

Description

 

Dublin Descriptor

Written Test

Execution of simple encryption algorithms

Solution of numerical problems (complexity and cost estimation)

1, 2, 5

1, 2, 3

Periodic Assessments

Programming of encryption algorithms

Solution of numerical problems (complexity and cost estimation)

1, 2, 5

1, 2, 3


Bibliografia
Risorsa bibliografica facoltativaJean-Philippe Aumasson, Serious Cryptography, Editore: no starch press, Anno edizione: 2017, ISBN: 978-1-59327-826-7
Risorsa bibliografica facoltativaNigel Smart, Cryptography, An Introduction: Third Edition, Anno edizione: 2012
Risorsa bibliografica facoltativaWade Trappe and Lawrence Washington, Introduction to Cryptography with Coding Theory (2nd edition), Editore: Prentice Hall, Anno edizione: 2005, ISBN: 978-0131862395
Note:

disponibile anche in Italiano


Software utilizzato
Nessun software richiesto

Forme didattiche
Tipo Forma Didattica Ore di attività svolte in aula
(hh:mm)
Ore di studio autonome
(hh:mm)
Lezione
30:00
45:00
Esercitazione
20:00
30:00
Laboratorio Informatico
0:00
0:00
Laboratorio Sperimentale
0:00
0:00
Laboratorio Di Progetto
0:00
0:00
Totale 50:00 75:00

Informazioni in lingua inglese a supporto dell'internazionalizzazione
Insegnamento erogato in lingua Inglese
Disponibilità di materiale didattico/slides in lingua inglese
Disponibilità di libri di testo/bibliografia in lingua inglese
Possibilità di sostenere l'esame in lingua inglese
Disponibilità di supporto didattico in lingua inglese
schedaincarico v. 1.8.3 / 1.8.3
Area Servizi ICT
03/12/2023