SICUREZZA DEI SISTEMI INFORMATIVI

ING-INF/05 - 6 CFU - 1° Semester

Teaching Staff

MICHELE GIUSEPPE MALGERI


Learning Objectives

Knowledge and understanding abilities

_ Knowledge of theoretical principles and technology of Network Security
​_ Knowledge of cryptography principles and most important and used schemas
_ Knowledge of currently used security protocols
​_ Knowledge of the technologies and algorithms need to most important network services linked to network security
​_ Knowledge of the security design methods

Applying knowledge and understanding abilities

_ Ability to correctly configure a network services using state of the art devices


Course Structure

The course is arranged into a series of lectures and some open discussions about the main topics.

Should teaching be carried out in mixed mode or remotely, it may be necessary to introduce change with respects to previous statements, in line with the programme planned and outlined in the syllabus



Detailed Course Content

Kerckoff, Security Attacks, Security Services, Security Mechanisms

Substitution Techniques, Transposition Techniques, Rotor Machines (Enigma)

Block Ciphers and the Data Encryption Standard: Block Cipher Principles, The Data Encryption Standard, The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles. The AES Cipher, Multiple Encryption and Triple DES 175

Block Cipher Modes of Operation, ECB, CBC, FCB, OFB, CTR

Stream Ciphers and RC4 189

Key Distribution Random Number Generation, Public-Key Encryption and Hash Functions

Public-Key Cryptography and RSA, Principles of Public-Key Cryptosystems, The RSA Algorithm

Key Management; Other Public-Key Cryptosystems, Diffie-Hellman Key Exchange

Message Authentication and Hash Functions, Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions

Digital Signatures and Authentication Protocols

Network Security Applications, Kerberos, Electronic Mail Security, Pretty Good Privacy, S/MIME

IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload

Secure Socket Layer and Transport Layer Security

Viruses and Related Threats

Security Standards



Textbook Information

Cryptography and Network Security,
William Stallings
Publisher: Prentice Hall




Open in PDF format Versione in italiano