_____________________________________________________________________________________


1. INTRODUCTION

1.1. Course introduction

2. INTRODUCTION TO SECURITY

2.1. What is security
2.2. Possible attacks and incidents
2.3. Security services
1. Confidentiality
2. Integrity
3. Authentication
4. Non repudiation
5. Access control

2.4. Security mechanisms

1. Naming and conventions
2. Cryptosystems

2.5. Ciphering location

1. Hop by hop
2. End to end
3. End to end ciphering location
4. Traffic analysis

3. SYMMETRIC ENCRYPTION

3.1. Introduction
1. Model
2. Cryptographic attacks

3.2. Classic encryption techniques

1. Substitution
  • Cesar
  • Simple
  • Vignere
  • Beaufort

2. Transposition

3. Evolutive keys

3.3. Previous concepts

1. Computational security
2. Types of ciphers

3.4. DES

1. History
2. Characteristics
3. Properties
4. Operation modes
  • ECB
  • CBC
  • CFB
  • OFB
  • Triple DES
    • Double DES
    • Triple DES

3.5. Rijndael

1. Introduction to AES

2. Structure

3.6. Key distribution

1. Introduction
2. Previous ideas
  • Keys to distribute
  • Update frequency
  • Key generation

3. Distribution techniques

  • Direct
  • Indirect
  • Distribution protocols


4. ASYMMETRIC ENCRYPTION

4.1. Introduction
4.2. Mathematical basis
1. Congruence
2. Euclides Algorithm
3. Euler function
4. Modified Euclides algorithm

4.3. RSA

1. Introduction
2. Number theory
3. Examples
4. Computational details

4.4. ElGamal algorithm

4.5. Elliptic curves

1. Curves theory
2. Need of finite fields
3. ElGamal algorithm
4. Diffie-Hellman algorithm


5. AUTHENTICATION AND DIGITAL SIGN

5.1. Problem

1. Introduction
2. Previous schemes

5.2. Integrity

1. Encryption +CRC
2. Cryptographic Checksum
    • Introduction
    • Computational security

5.3. Hash functions

1. Introduction
2. Properties
3. Hash function applications
  • MICs
  • Encryption
4. Hash algorithms
    • MAC and MDC
    • Based on encryption blocks
    • SHA
5.4. Digital sign

1. DS requirements
2. DS algorithms
3. Certification
  • Introduction
  • X.509
  • Revocation
  • Process description
  • Digital sign algorithms

5.5. Symmetric key distribution using asymmetric encryption

1. Asymmetric encryption
2. Diffie-Hellman

6. APPLICATIONS: IPSEC

1.Network layer security: IPSec

Last modified: Monday, 23 May 2022, 9:48 AM