FOUNDATIONS OF CRYPTOGRAPHY
This section aims at introducing the students to the basic concepts underlying modern cryptography
Basic concepts and definitions
Cryptanalysis and security models
Symmetric encryption
- Block ciphers
- DES, AES
- Stream ciphers
- Key distribution
Asymmetric cryptography
- Basic concepts, trapdoor functions
- Some popular public-key cryptosystems: RSA
Key distribution: Diffie-Helman key exchange protocol
Authentication
- MAC functions
- Hash functions
- Digital signatures
Random Number generators
Signal and information processing in the encrypted domain
- Application to privacy protection
COMPUTER SECURITY
This section puts in practice the cryptographic tools developed in the previous sections and enlarges the horizon to discuss several classes of threats against cybersystems and to present possible countermeasures
User authentication
- Password-Based Authentication
- Token-Based Authentication
- Biometric Authentication
- Remote User Authentication
Access control
- Basic principles
- Discretionary Access Control
- Role-Based Access Control
- Attribute-Based Access Control
Malicious Software (Malware)
- Classification of Malware
- Propagation mechanisms
- Payloads
- Countermeasures
Denial of Service (DoS) attacks
- Classification of DoS
- Distributed DoS attacks
- Defenses
Intrusion detection and prevention
- Host-based intrusion detection
- Network-based intrusion detection
- Firewalls
SECURE COMMUNICATIONS
This section involves the student with laboratory activity, according to the “learning by doing" paradigm
End point authentication
- type of attacks: spoofing, playback, man in the middle
- countermeasures: nonces, cryptography, certificates
Application layer security
- how to secure e-mails
- PGP and GPG examples
Traffic analyzers and packet sniffers
- tools to sniff, capture and analyse packets
- lab exercises on the use of Wireshark traffic analyser
Transport layer security
- secure TCP connections, SSL/TLS details
Wireless LANs security:
- WI-FI (WEP, WPA, WPA2, IEEE_802.11i)
- How to hack WLAN security
Deep Web, Dark Web: main concepts, keeping anonymous your Internet traffic
Crypto-currencies: blockchain and the Bitcoin
MULTIMEDIA SECURITY
This section introduces the problems related to the protection and authentication of multimedia contents. The basic concepts will be illustrated by means of laboratory experiments
Data hiding and watermarking
Steganography
Steganalysis
Multimedia Forensics
- Source identification
- Tampering detection