Sicurezza nelle Reti di Telecomunicazione
Telecommunication Network Security Marco Baldi
Basic concepts of telecommunications.
KNOWLEDGE AND UNDERSTANDING:
The course will allow students to achieve an advanced knowledge of the principles and practices of digital data security. Such a knowledge, built upon the theoretical and practical principles provided by the courses in the area of telecommunications, will bring the student a wide awareness about classical as well as modern approaches and methods to obtain transmissions of digital data able to guarantee confidentiality, authentication, integrity and non-repudiation.CAPACITY TO APPLY KNOWLEDGE AND UNDERSTANDING:
The student will become able to apply his knowledge to face advanced design challenges concerning the analysis and the use of algorithms for encryption, authentication and digital signing of messages, as well as protocols and systems for secure transmissions and storage of digital data. Such an ability will be translated into some professional skills, like the ability of assessing the security level which is necessary for data relevant to some specific applications and of identifying the critical elements in the design of secure telecommunication networks.TRANSVERSAL SKILLS:
Students will perform group exercises based on the use and development of software for implementing and validating techniques for digital data security. This will contribute to improving their autonomous judgment skills in defining the path to the solution of problems. Communication skills will also be refined by group work. Also their learning abilities will be improved by group work and by the use of software tools which will integrate didactic materials.
Introduction to information security and cryptography.
Principles of number theory.
Principles of information theory.
Principles of coding theory.
Symmetric and asymmetric cryptography.
DES, AES, RSA, ElGamal cryptographic systems.
Cryptographic systems based on error correcting codes.
Protocols for digital signatures.
Protocols for networks security.
Physical layer security.
Software exercises on security techniques.
Development of the examination
LEARNING EVALUATION METHODS
The exam consists of an oral test, in which the student will be asked to explain the basic concepts and describe the main techniques concerning security in telecommunications networks. It will also be proposed to each student to perform an in-depth analysis by carrying out a project or, at the option of the student, preparing a paper on one of the topics of the course.
LEARNING EVALUATION CRITERIA
The student, during the oral test, will have to present and discuss the project or paper and demonstrate the theoretical and practical knowledge of techniques for ensuring security in telecommunications networks. To successfully pass the oral exam, the student will have to demonstrate an overall knowledge of the contents of the course, presented in a sufficiently correct way and with the use of proper technical terminology. The highest rating is achieved by demonstrating a thorough understanding of the course contents, exposed with mastery of the technical language.
LEARNING MEASUREMENT CRITERIA
The ability and autonomy of the student in facing and solving theoretical and practical problems related to the security of telecommunication networks will be assessed during examinations.
FINAL MARK ALLOCATION CRITERIA
The final mark will be computed by summing the evaluation of the oral examination to that of the project or paper prepared by the student. The student will be able to achieve up to a maximum of 10 points through the presentation and discussion of the project or the paper. The oral exam will be divided into two or three questions, depending on whether or not the student will present the project or paper. Each question will be evaluated with a score ranging from 0 to 10 points. Honors students will be those who achieve the highest rating and also demonstrate full mastery of the subject.
Lecture notes provided by the teacher.
W. Trappe, L. C. Washington, Introduction to Cryptography with Coding Theory, Pearson - Prentice Hall.
W. Stallings, Cryptography and Network Security: Principles and Practice, Pearson - Prentice Hall.
M. Baldi, QC-LDPC Code-Based Cryptography, SpringerBriefs in Electrical and Computer Engineering.
- Ingegneria Elettronica (Corso di Laurea Magistrale (DM 270/04))