_____________________________________________________________________________________
1. INTRODUCTION
1.1. Course introduction2. INTRODUCTION TO SECURITY
2.1. What is security2.2. Possible attacks and incidents2.3. Security services1. Confidentiality
2. Integrity
3. Authentication
4. Non repudiation
5. Access control
2.4. Security mechanisms
1. Naming and conventions
2. Cryptosystems
2.5. Ciphering location
1. Hop by hop
2. End to end
3. End to end ciphering location
4. Traffic analysis
3. SYMMETRIC ENCRYPTION
3.1. Introduction1. Model
2. Cryptographic attacks
3.2. Classic encryption techniques
1. Substitution
- Cesar
- Simple
- Vignere
- Beaufort
2. Transposition
3. Evolutive keys
3.3. Previous concepts
1. Computational security
2. Types of ciphers
3.4. DES
1. History
2. Characteristics
3. Properties
4. Operation modes
3.5. Rijndael
1. Introduction to AES
2. Structure
3.6. Key distribution
1. Introduction
2. Previous ideas
- Keys to distribute
- Update frequency
- Key generation
3. Distribution techniques
- Direct
- Indirect
- Distribution protocols
4. ASYMMETRIC ENCRYPTION
4.1. Introduction4.2. Mathematical basis1. Congruence
2. Euclides Algorithm
3. Euler function
4. Modified Euclides algorithm
4.3. RSA
1. Introduction
2. Number theory
3. Examples
4. Computational details
4.4. ElGamal algorithm
4.5. Elliptic curves
1. Curves theory
2. Need of finite fields
3. ElGamal algorithm
4. Diffie-Hellman algorithm
5. AUTHENTICATION AND DIGITAL SIGN
5.1. Problem
1. Introduction
2. Previous schemes
5.2. Integrity
1. Encryption +CRC
2. Cryptographic Checksum
- Introduction
- Computational security
5.3. Hash functions
1. Introduction
2. Properties
3. Hash function applications
4. Hash algorithms- MAC and MDC
- Based on encryption blocks
- SHA
5.4. Digital sign1. DS requirements
2. DS algorithms
3. Certification
- Introduction
- X.509
- Revocation
- Process description
- Digital sign algorithms
5.5. Symmetric key distribution using asymmetric encryption
1. Asymmetric encryption
2. Diffie-Hellman
6. APPLICATIONS: IPSEC
1.Network layer security: IPSec