Graduate School and Research Center In communication systems

Secure communications

[SecCom]
T Technical Teaching


Abstract

  • This course provides a broad introduction to cryptography and communication security mechanisms based on cryptography. The course covers fundamental aspects such as security evaluation criteria and the mathematical constructs underlying cryptographic primitives as well as applied aspects like the design of major encryption and hashing algorithms, details of security mechanisms relying on cryptography such as data encryption, integrity, digital signature, authentication,  key management, and public-key infrastructures.

Description

  •  Security Basics :

Policy, model, security services, security function placement in layered communication systems

  • Cryptography :

Classical ciphers, security evaluation, entropy, key equivocation function, unicity distance, perfect secrecy, one-time pad

  • Encryption Algorithms

Symmetric algorithms, Feistel cipher, DES, Number Theory, IDEA, AES, Cascade of ciphers, stream ciphers, RC4, asymmetric algorithms, one-way functions, Diffie-Hellman, RSA, El Gamal, Elliptic Curve Cryptography

  • Data Encryption and Integrity Mechanism

Statistical attacks, operational modes (CBC, CFB, OFB, CTR), hash functions and data integrity, MAC and MDC, security properties of hash functions, alternatives for MAC implementation

  • Digital Signatures and Non-Repudiation

El Gamal signature algorithm, Digital Signature Standard, non-repudiation mechanisms

  • Authentication and Key Management

Authentication protocols, passwords, personal devices, key generation, symmetric key distribution, Kerberos, public-key certification and PKI systems, law enforcement.

Nb hours: 42.00
Nb hours per week: 3.00
Control form: examen écrit