Lectures:
• Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
• Introduction to number theory.
• Cryptography: basic concepts, cryptanalytic attacks.
• Cryptography: classical techniques and its cryptanalysis.
• Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
• Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA, ELGamal.
• Key management. Key exchange, Diffie-Hellman.
• Authentication, authentication protocols, biometry.
• Hash function, MAC.
• Digital signature, DSS. Certificates, certificate authority.
• Eliptic curve cryptography.
• Firewalls, electronic mail security (PEM, PGP, S/MIME), SSL.
• Standards (ITSEC, ITSEM, Common Criteria, ISO 9000,...) and legislative aspects of IT security.
Computer laboratories
• Practice the mathematical principles of the algorithms discussed.
• Modular arithmetic.
• Algebraic structures.
• Number theory.
• Historical cryptography.
• Symmetric cryptography.
• Asymmetric cryptography.
• Hashing functions.
• Practical examples of security applications and protocols I.
• Practical demonstrations of security applications and protocols II.
• Practical demonstrations of security applications and protocols III.
• Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
• Introduction to number theory.
• Cryptography: basic concepts, cryptanalytic attacks.
• Cryptography: classical techniques and its cryptanalysis.
• Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
• Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA, ELGamal.
• Key management. Key exchange, Diffie-Hellman.
• Authentication, authentication protocols, biometry.
• Hash function, MAC.
• Digital signature, DSS. Certificates, certificate authority.
• Eliptic curve cryptography.
• Firewalls, electronic mail security (PEM, PGP, S/MIME), SSL.
• Standards (ITSEC, ITSEM, Common Criteria, ISO 9000,...) and legislative aspects of IT security.
Computer laboratories
• Practice the mathematical principles of the algorithms discussed.
• Modular arithmetic.
• Algebraic structures.
• Number theory.
• Historical cryptography.
• Symmetric cryptography.
• Asymmetric cryptography.
• Hashing functions.
• Practical examples of security applications and protocols I.
• Practical demonstrations of security applications and protocols II.
• Practical demonstrations of security applications and protocols III.