logo-polimi
Loading...
Risorse bibliografiche
Risorsa bibliografica obbligatoria
Risorsa bibliografica facoltativa
Scheda Riassuntiva
Anno Accademico 2014/2015
Scuola Scuola di Ingegneria Industriale e dell'Informazione
Insegnamento 095947 - CRYPTOGRAPHY AND ARCHITECTURES FOR COMPUTER SECURITY
Docente Pelosi Gerardo
Cfu 5.00 Tipo insegnamento Monodisciplinare

Corso di Studi Codice Piano di Studio preventivamente approvato Da (compreso) A (escluso) Insegnamento
Ing Ind - Inf (Mag.)(ord. 270) - MI (434) INGEGNERIA INFORMATICA* AZZZZ095947 - CRYPTOGRAPHY AND ARCHITECTURES FOR COMPUTER SECURITY
Ing Ind - Inf (Mag.)(ord. 270) - MI (481) COMPUTER SCIENCE AND ENGINEERING - INGEGNERIA INFORMATICA* AZZZZ095947 - CRYPTOGRAPHY AND ARCHITECTURES FOR COMPUTER SECURITY

Programma dettagliato e risultati di apprendimento attesi

Anno Accademico: 2014 / 2015

Scuola: Scuola di Ingegneria Industriale e Informazione

Insegnamento: 095947 - Cryptography and Architectures for Computer Security

Docente:Gerardo Pelosi

Cfu:5.00

Tipo insegnamento:Monodisciplinare

Corso di Studi: Ing. Ind - Inf (Mag.)(ord. 270) - MI (434) INGEGNERIA INFORMATICA

 

 

LEARN OBJECTIVES AND COURSE CONTENT

The course provides a systematic formation on the cryptographic techniques currently employed in communication and data storage. It focuses on the algorithms, the related HW/SW efficient architectures, and points out the new trends and crypto-schemes under development. It extends and closely examines how to effectively and correctly use cryptography in the broad field of computer security.

The mathematical aspects of modern cryptography are presented, preceded by a recap of finite field theory. The most important cryptographic schemes are presented, together with their practical realization details, APIs and implementation vulnerabilities. Furthermore, the most common communication protocols (SSL/TLS, SSH, PGP, Kerberos, Onion Routing) and data storage protocols (IEEE P1619 standard used in Truecrypt) are described. Hardware and software architectures for efficient and implementation-secure realizations of cryptographic schemes are presented and detailed for real-world systems. The course interleaves mathematical topics and more engineering-oriented topics through merging theoretical and practical aspects, via the analysis of significant industrial cases.

These concepts are relevant for a system designer in need to properly use the cryptographic technologies in system and application contexts, and to an hardware designer in need to develop secure digital architectures.

 

 

SYLLABUS

[Cryptography principles and algorithms]

Security services: confidentiality, integrity, authentication and non-repudiation

History of cryptography

Foundations of modern cryptography

 

Symmetric algorithms and modes of operation

Elements of modern block cipher cryptanalysis

Hash functions

Asymmetric algorithms (RSA, ElGamal, Diffie-Hellman, Elliptic Curve based Cryptosystems)

Elements of asymmetric cipher cryptanalysis

 

[Architectures and protocols]

Efficient asymmetric cipher implementations

Public Key Infrastructure, Web of Trust and distributed notary schemes

Secure (SSL/TLS, SSH) and anonymous (onion routing) communication protocols

Secure data storage protocols: IEEE P1619 standard

Secure authentication schemes, bruteforcing-safe password storage and Kerberos

Security-aware device architectures: cryptographic accelerators and crypto-processors

Side channel attack methodologies and countermeasures


 

 

REFERENCES

the material will be available on the teacher's website.

http://crypto.dei.polimi.it/doku.php?id=courses:csdd,

http://home.dei.polimi.it/pelosi

 

 

 

 

 


Note Sulla Modalità di valutazione

EXAM MODALITY

The exam consists of a written test.

It is possible to integrate the exam either with a programming project or with a report on further readings.

The exam is individual, the projects may be assigned to a team of at most two people.

 


Bibliografia
Risorsa bibliografica facoltativaNigel P. Smart, "Cryptography, An Introduction", Anno edizione: 2008
Risorsa bibliografica facoltativa : http://www.cs.bris.ac.uk/~nigel/Crypto_Book/
Risorsa bibliografica facoltativaJ. Katz and Y. Lindell,, "Introduction to Modern Cryptography", Editore: Chapman & Hall, Anno edizione: 2007
Risorsa bibliografica facoltativa http://www.cs.umd.edu/~jkatz/imc.html

Mix Forme Didattiche
Tipo Forma Didattica Ore didattiche
lezione
32.0
esercitazione
16.0
laboratorio informatico
0.0
laboratorio sperimentale
0.0
progetto
0.0
laboratorio di progetto
0.0

Informazioni in lingua inglese a supporto dell'internazionalizzazione
Insegnamento erogato in lingua Inglese
schedaincarico v. 1.6.1 / 1.6.1
Area Servizi ICT
20/11/2019